2012
DOI: 10.1109/tsmcc.2010.2091501
|View full text |Cite
|
Sign up to set email alerts
|

Single RFID Tag Ownership Transfer Protocols

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1

Citation Types

0
44
0
3

Year Published

2012
2012
2016
2016

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 61 publications
(47 citation statements)
references
References 12 publications
0
44
0
3
Order By: Relevance
“…Then s/he continues with the following attack steps to pass the verification of R 2 . [4]. They claimed that the presented protocols have achieved forward security.…”
Section: Cryptanalysis Of Kapoor Et Al's Protocolmentioning
confidence: 94%
See 2 more Smart Citations
“…Then s/he continues with the following attack steps to pass the verification of R 2 . [4]. They claimed that the presented protocols have achieved forward security.…”
Section: Cryptanalysis Of Kapoor Et Al's Protocolmentioning
confidence: 94%
“…Over the past four years, the high-performance OT protocols proposed by Kapoor and Piramuthu [4] were high-cost on account of adopting a function encrypted with the key and an encrypted function. However, it is difficult to apply their protocols in the low cost setting.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Kapoor and Piramuthu [9] suggests a two party ownership transfer protocol based on keyed hash functions. In order to provide forward unlinkability, the new owner of tag T , O (T,k+1) does not have access to the key of the previous owner O (T,k+1) .…”
Section: Related Workmentioning
confidence: 99%
“…모든 태그는 유일한 ID와 [7,8,9]으로 나뉠 수 있으며, 리더가 위조를 판별 하기 위해 서버의 도움을 받는지 여부에 따라 온라인 [9], 오프라인 [8], 그리고 준-오프라인(semi-offline) 방식 [7] [1,[12][13][14][15][16][17][18]. 기 존의 프로토콜들은 공개키 암호화를 사용하는 방법 [12], 대칭키를 사용하는 방법 [1,13,14,17], 그리고 해 시함수를 사용하는 방법 [15,16,18] …”
unclassified