Show simple item record

dc.contributor.authorYousuf, Y.
dc.contributor.authorPotdar, Vidyasagar
dc.date.accessioned2017-01-30T12:20:33Z
dc.date.available2017-01-30T12:20:33Z
dc.date.created2008-11-12T23:36:16Z
dc.date.issued2008
dc.identifier.citationYousuf, Yawer and Potdar, Vidyasagar. 2008. : A survey of RFID authentication protocols, in Enokido, Tomoya and Awan, Irfan (ed), Advanced Information Networking and Applications - Workshops, 2008. AINAW 2008. 22nd International Conference on, 25 Mar 2008, pp. 1346-1350. Okinawa, Japan: IEEE Computer Society.
dc.identifier.urihttp://hdl.handle.net/20.500.11937/20692
dc.identifier.doi10.1109/WAINA.2008.214
dc.description.abstract

RFID are small wireless devices which can be used for identification of objects and humans as well. Their acceptance has grown in past years and is expected to grow further. Due to reduction in cost of production RFID devices are being deployed in large numbers in supply chains (by Wal-Mart, etc.) In this paper we provide a comprehensive survey of various RFID authentication protocols proposed in the literature and classify them in different categories. We then study two main RFID authentication protocols namely LMAP and M2MAP

dc.publisherIEEE Computer Society
dc.titleA survey of RFID authentication protocols
dc.typeConference Paper
dcterms.source.startPage1346
dcterms.source.endPage1350
dcterms.source.titleAdvanced Information Networking and Applications - Workshops, 2008. AINAW 2008. 22nd International Conference on
dcterms.source.seriesAdvanced Information Networking and Applications - Workshops, 2008. AINAW 2008. 22nd International Conference on
dcterms.source.conferenceAdvanced Information Networking and Applications - Workshops, 2008. AINAW 2008. 22nd International Conference on
dcterms.source.conference-start-date25 Mar 2008
dcterms.source.conferencelocationOkinawa, Japan
dcterms.source.placeJapan
curtin.note

Copyright 2008 IEEE

curtin.note

This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

curtin.departmentCentre for Extended Enterprises and Business Intelligence
curtin.identifierDEL-CBS-EEB-EA-44446
curtin.identifierEPR-2892
curtin.accessStatusOpen access
curtin.facultyCurtin Business School
curtin.facultySchool of Information Systems


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record