Oct 7, 2011 · As radio-frequency identification (RFID) can quickly identify an object without requiring physical contact, it provides efficient ...
[PDF] An RFID System Yoking Proof Protocol Conforming to EPCglobal ...
ir.lib.cyut.edu.tw › bitstream
Feb 25, 2011 · A good yoking proof scheme should conform to EPCglobal C1G2 standards and resist related attacks, such as replay attacks, man-in-the-middle ...
... Chen and Wu [30] proposed a novel yoking proof that conforming to the EPC global C1G2 standard with forward security. Their protocol is claimed to resist ...
Suitably, a good yoking proof scheme should conform to EPCglobal C1G2 standards [7] or resist related attacks, such as replay attacks, man-in-the- middle ...
An RFID System Yoking Proof Protocol Conforming to EPCglobal C1G2 Standards. Authors: Chen, Chin-Ling;Wu, Chun-Yi 陳金鈴. Contributors: 資訊工程系. Date: 2014 ...
We propose the concept of a yoking-proof, namely a proof that a pair of RFID tags has been scanned simultaneously. Our particular aim is to permit tags to ...
Abstract—In this paper, we focus on a par- ticular RFID application called a grouping- proof, where an entity such as an RFID reader generates a proof that ...
RFID ownership transfer authorization systems conforming EPCglobal class-1 generation-2 standards. International Journal of Network Security. (May 2011). Choo ...
An RFID system yoking-proof protocol conforming to EPCglobal C1G2 standards. Security and Communication Networks, 2011. Flaws on RFID grouping-proofs.
We provide some guidelines that should be followed to design secure protocols and preclude past errors. Finally, we present a yoking-proof for low-cost RFID ...