Back to Results
First PageMeta Content
Data / Automatic identification and data capture / Privacy / Radio-frequency identification / Wireless / IP / Communications protocol / Replay attack / Distance-bounding protocol / Cryptography / Cryptographic protocols / Information


Scalable Grouping-proof Protocol for RFID Tags Grouping-Proof Protocol for RFID Tags: Security Definition and Scalable Construction Dang Nguyen Duc
Add to Reading List

Document Date: 2009-12-09 01:55:21


Open Document

File Size: 203,60 KB

Share Result on Facebook

Company

Fiat / Fgroup / Chi-Lung Chiang / IEEE Press / Coexistence Proof / /

/

Event

FDA Phase / /

IndustryTerm

authentication protocol / tamper-proof chip / distance bounding protocol / groupingproof protocols / proposed grouping-proof protocol / secure groupingproof protocol / above protocol / secure grouping-proof protocol / lightweight authentication protocols / retail store / distance-bounding protocol / secure protocol / timestamp-chaining protocol / groupingproof protocol / secure grouping-proof protocols / online verifier / /

Organization

pp. / Department of Computer Science / IEEE Computer Society / Security Definition and Scalable Construction Dang Nguyen Duc Kwangjo Kim Department of Information and Communications Engineering / /

Person

Serge Vaudenay / Yuan-Cheng Lai / Ari Juels / Ryan Moriarty / Dang Nguyen Duc / Mike Burmester / Rossana Motta / Duc Kwangjo Kim / Breno de Medeiros / Junichiro Saitoh / Chung Lin / Kouichi Sakurai / Scott A. Vanstone / Paul C. van Oorschot / Alfred Menezes / /

Position

representative / dealer / /

Product

RFID / RFID Tags / /

ProgrammingLanguage

R / K / /

PublishedMedium

Lecture Notes in Computer Science / /

Technology

Scanning Protocols / authentication protocol / proposed grouping-proof protocol / RFID Tags protocol / one protocol / grouping-proof protocols / 1st Protocol / secure groupingproof protocol / above protocol / lightweight authentication protocols / previous protocols / secure grouping-proof protocol / previous grouping-proof protocols / groupingproof protocol / two grouping-proof protocols / two protocols / Secret key / existing groupingproof protocols / location-based protocol / An RFID distance bounding protocol / encryption / tamper-proof chip / cryptography / timestamp-chaining protocol / distance-bounding protocol / 2nd Protocol / secure grouping-proof protocols / Introduction Grouping-proof protocols / distance bounding protocol / tags Reader Symmetric encryption / secure protocol / 1 Encryption / yoking-proof protocol / grouping-proof protocol / proposed protocol / /

URL

http /

SocialTag