Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
553282 | Decision Support Systems | 2011 | 7 Pages |
Abstract
As RFID-tagged systems become ubiquitous, the acceptance of this technology by the general public necessitates addressing related security/privacy issues. The past six years have seen an increasing number of publications in this direction, specifically using cryptographic approaches. We consider a stream of publications among these that consider mutual authentication of tag and reader, and identify some existing vulnerabilities.
Related Topics
Physical Sciences and Engineering
Computer Science
Information Systems
Authors
Selwyn Piramuthu,