Show simple item record

dc.contributor.authorSyamsuddin, I
dc.contributor.authorDillon, Tharam S.
dc.contributor.authorChang, Elizabeth
dc.contributor.authorHan, Song
dc.contributor.editorDhillon, G. and Lee, J. and Ko, F.
dc.date.accessioned2017-01-30T11:07:43Z
dc.date.available2017-01-30T11:07:43Z
dc.date.created2009-02-10T18:02:16Z
dc.date.issued2008
dc.identifier.citationSyamsuddin, Irfan and Dillon, Tharam and Chang, Elizabeth and Han, Song. 2008. A survey of RFID authentication protocols based on hash-chain method, in Dhillon, G. and Lee, J. and Ko, F. (ed), Third International Conference on Convergence and Hybrid Information Technology, Nov 11 2008, pp. 559-564. Busan, Korea: Institute of Electrical and Electronics Engineers (IEEE) Computer Society
dc.identifier.urihttp://hdl.handle.net/20.500.11937/8607
dc.identifier.doi10.1109/ICCIT.2008.314
dc.description.abstract

Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication. Although the protocols able to provide specific solution for RFID security and privacy problems, they fail to provide integrated solution. This article is a survey to closely observe those protocols in terms of its focus and limitations.

dc.publisherInstitute of Electrical and Electronics Engineers (IEEE) Computer Society
dc.subjectRFID
dc.subjecthash chain
dc.subjectprivacy
dc.subjectsecurity
dc.titleA survey of RFID authentication protocols based on hash-chain method
dc.typeConference Paper
dcterms.source.startPage559
dcterms.source.endPage564
dcterms.source.titleProceedings of the 3rd international conference on convergence and hybrid information technology (ICCIT 2008)
dcterms.source.seriesProceedings of the 3rd international conference on convergence and hybrid information technology (ICCIT 2008)
dcterms.source.isbn9780769534077
dcterms.source.conference3rd International Conference on Convergence and Hybrid Information Technology (ICCIT 2008)
dcterms.source.conference-start-date11 Nov 2008
dcterms.source.conferencelocationBusan, Korea
dcterms.source.placeKorea
curtin.note

Copyright © 2008 IEEE This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.

curtin.departmentCentre for Extended Enterprises and Business Intelligence
curtin.accessStatusOpen access
curtin.facultyCurtin Business School
curtin.facultySchool of Information Systems


Files in this item

Thumbnail

This item appears in the following Collection(s)

Show simple item record