Privacy of Recent RFID Authentication Protocols

@inproceedings{Ouafi2008PrivacyOR,
  title={Privacy of Recent RFID Authentication Protocols},
  author={Khaled Ouafi and Raphael C.-W. Phan},
  booktitle={ISPEC},
  year={2008}
}
Privacy is a major concern in RFID systems, especially with widespread deployment of wireless-enabled interconnected personal devices e.g. PDAs and mobile phones, credit cards, e-passports, even clothing and tires. An RFID authentication protocol should not only allow a legitimate reader to authenticate a tag but it should also protect the privacy of the tag against unauthorized tracing: an adversary should not be able to get any useful information about the tag for tracking or discovering the… CONTINUE READING
Highly Influential
This paper has highly influenced 15 other papers. REVIEW HIGHLY INFLUENTIAL CITATIONS
Highly Cited
This paper has 116 citations. REVIEW CITATIONS

Citations

Publications citing this paper.
Showing 1-10 of 67 extracted citations

An AKARI-based Secure Communication Scheme for EPC Tags

2017 Advances in Wireless and Optical Communications (RTUWO) • 2017
View 5 Excerpts
Highly Influenced

Privacy analysis and improvements of two recent RFID authentication protocols

2014 11th International ISC Conference on Information Security and Cryptology • 2014
View 4 Excerpts
Highly Influenced

Attacks and improvements on two new-found RFID authentication protocols

7'th International Symposium on Telecommunications (IST'2014) • 2014
View 3 Excerpts
Highly Influenced

Simulation-Based Traceability Analysis of RFID Authentication Protocols

Wireless Personal Communications • 2014
View 4 Excerpts
Highly Influenced

116 Citations

01020'10'13'16'19
Citations per Year
Semantic Scholar estimates that this publication has 116 citations based on the available data.

See our FAQ for additional information.

References

Publications referenced by this paper.
Showing 1-10 of 20 references

Defining Strong Privacy for RFID

PerCom Workshops • 2007
View 9 Excerpts
Highly Influenced

Severless Search and Authentication Protocols for RFID

Fifth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom'07) • 2007
View 6 Excerpts
Highly Influenced

YA-TRAP: yet another trivial RFID authentication protocol

Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06) • 2006
View 6 Excerpts
Highly Influenced

Forward-secure RFID Authentication and Key Exchange

IACR Cryptology ePrint Archive • 2007
View 7 Excerpts
Highly Influenced

On Privacy Models for RFID

ASIACRYPT • 2007
View 5 Excerpts
Highly Influenced

Similar Papers

Loading similar papers…