A critical analysis of RFID security protocols
dc.contributor.author | Sharif, A. | |
dc.contributor.author | Potdar, Vidyasagar | |
dc.contributor.author | Chang, Elizabeth | |
dc.date.accessioned | 2017-01-30T13:26:52Z | |
dc.date.available | 2017-01-30T13:26:52Z | |
dc.date.created | 2008-11-12T23:36:16Z | |
dc.date.issued | 2008 | |
dc.identifier.citation | Sharif, Atif and Potdar, Vidyasagar and Chang, Elizabeth. 2008. : A critical analysis of RFID security protocols, in Tchepnda, Christian and Paruchuri, Vamsi (ed), Advanced Information Networking and Applications - Workshops, 2008. AINAW 2008. 22nd IEEE International Conference on, 25 Mar 2008, pp. 1357-1362. Okinawa, Japan: IEEE. | |
dc.identifier.uri | http://hdl.handle.net/20.500.11937/31691 | |
dc.identifier.doi | 10.1109/WAINA.2008.212 | |
dc.description.abstract |
RFID, Radio Frequency IdentificationSystems, have gains its popularity for automated identification and supply chain applications. This paper describes the technical fundamentals of RFID systems, recent technical research on the problems of privacy/security and some security proposals are presented for this new radio technology i.e. RFID. | |
dc.publisher | IEEE | |
dc.subject | RFID | |
dc.subject | Reader | |
dc.subject | Encryption | |
dc.subject | Security | |
dc.subject | Tags | |
dc.subject | Hash Locking | |
dc.subject | Privacy | |
dc.subject | Transponder | |
dc.subject | Electronic Product Code (EPC) | |
dc.title | A critical analysis of RFID security protocols | |
dc.type | Conference Paper | |
dcterms.source.startPage | 1357 | |
dcterms.source.endPage | 1362 | |
dcterms.source.title | Advanced Information Networking and Applications - Workshops, 2008. AINAW 2008. 22nd IEEE International Conference on | |
dcterms.source.series | Advanced Information Networking and Applications - Workshops, 2008. AINAW 2008. 22nd IEEE International Conference on | |
dcterms.source.conference | Advanced Information Networking and Applications - Workshops, 2008. AINAW 2008. 22nd IEEE International Conference on | |
dcterms.source.conference-start-date | 25 Mar 2008 | |
dcterms.source.conferencelocation | Okinawa, Japan | |
dcterms.source.place | Japan | |
curtin.note |
Copyright 2008 IEEE | |
curtin.note |
This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder. | |
curtin.department | Centre for Extended Enterprises and Business Intelligence | |
curtin.identifier | DEL-CBS-EEB-EA-44448 | |
curtin.identifier | EPR-2893 | |
curtin.accessStatus | Open access | |
curtin.faculty | Curtin Business School | |
curtin.faculty | School of Information Systems |