2015 International Conference on Cloud Technologies and Applications (CloudTech) 2015
DOI: 10.1109/cloudtech.2015.7336997
|View full text |Cite
|
Sign up to set email alerts
|

Security on RFID technology

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
3
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
4

Relationship

0
8

Authors

Journals

citations
Cited by 15 publications
(3 citation statements)
references
References 9 publications
0
3
0
Order By: Relevance
“…In [9,10] authors have discussed security issues and challenges for RFID and provides an overview of threats and attacks on RFID systems. A comprehensive study of attacks on RFID has been made by Khattab et al [11] in which they classified attacks on RFID into three types -physical attacks, system attacks, and channel attacks.…”
Section: Rfid Security Challengesmentioning
confidence: 99%
“…In [9,10] authors have discussed security issues and challenges for RFID and provides an overview of threats and attacks on RFID systems. A comprehensive study of attacks on RFID has been made by Khattab et al [11] in which they classified attacks on RFID into three types -physical attacks, system attacks, and channel attacks.…”
Section: Rfid Security Challengesmentioning
confidence: 99%
“…The authors in [4] discuss the security-related aspect of RFID technology. Here in this paper, there are various attacks mentioned on the RFID tag and reader.…”
Section: Literature Surveymentioning
confidence: 99%
“…Several authors have addressed security concerns and challenges for RFID. Guizani et al [7] and Kannouf et al [8] presented an overview of RFID system threats and attacks. Khattab et al [9] carried out a detailed analysis of RFID system attacks.…”
Section: Introductionmentioning
confidence: 99%