User-aided reader revocation in PKI-based RFID systems

  title={User-aided reader revocation in PKI-based RFID systems},
  author={Rishab Nithyanand and Gene Tsudik and Ersin Uzun},
  journal={Journal of Computer Security},
Recent emergence of RFID tags capable of performing public key operations motivates new RFID applications, including electronic travel documents, identification cards and payment instruments. In this context, public key certificates form the cornerstone of the overall system security. In this paper, we argue that one of the prominent challenges is how to handle revocation and expiration checking of RFID reader certificates. This is an important issue considering that these high-end RFID tags… CONTINUE READING


Publications citing this paper.


Publications referenced by this paper.
Showing 1-10 of 34 references

SUS: a “quick and dirty” usability scale

J. Brooke
P. W. Jordan, B. Thomas, B. A. Weerdmeester, and A. L. McClelland, editors, Usability Evaluation in Industry. Taylor and Francis, London, • 1996
View 5 Excerpts
Highly Influenced

Caveat eptor: A comparative study of secure device pairing methods

2009 IEEE International Conference on Pervasive Computing and Communications • 2009
View 1 Excerpt

Similar Papers

Loading similar papers…