Security Analysis of a Cryptographically-Enabled RFID Device.
Steve BonoMatthew GreenAdam StubblefieldAri JuelsAviel D. RubinMichael SzydloPublished in: USENIX Security Symposium (2005)
Keyphrases
- security analysis
- mutual authentication
- rfid tags
- public key
- smart card
- high security
- rfid systems
- low cost
- radio frequency identification
- authentication protocol
- security requirements
- security properties
- image encryption
- supply chain
- encryption scheme
- rfid technology
- data collection
- security issues
- data mining
- information security
- power consumption
- lightweight
- authentication scheme
- motion estimation
- multiresolution