A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
A Scalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation
[chapter]
2012
Lecture Notes in Computer Science
RFID systems allow fast and automatic identification of RFID tags through a wireless channel. Information on product items like name, model, purpose, expiration date, etc., can be easily stored and retrieved from RFID tags attached to items. That is why, in the near future, RFID tags can be an active part of our everyday life when interacting with items around us. Frequently, such items may change hands during their lifecycle. Therefore, beyond RFID identification protocols, there is a need for
doi:10.1007/978-3-642-25286-0_10
fatcat:tlfva3qoyrfkbprmqx3i34462a