Attacks and improvements on two new-found RFID authentication protocols

Abstract

In recent years, in order to provide secure communication between Radio Frequency Identification (RFID) users different RFID authentication protocols have been proposed. In this paper, we investigate weaknesses of two newfound RFID authentication protocols that proposed by Shi et al. and Liu et al. in 2014. The Ouafi-Phan privacy model is used for privacy… (More)

6 Figures and Tables

Cite this paper

@article{Abdolmaleki2014AttacksAI, title={Attacks and improvements on two new-found RFID authentication protocols}, author={Behzad Abdolmaleki and Karim Baghery and Bahareh Akhbari and Mohammad Reza Aref}, journal={7'th International Symposium on Telecommunications (IST'2014)}, year={2014}, pages={895-900} }