A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2019; you can also visit the original URL.
The file type is application/pdf
.
Scalable RFID Pseudonym Protocol
2009
2009 Third International Conference on Network and System Security
In this paper we address the issue of scalability in RFID pseudonym protocols. Many previously proposed protocols suffer from scalability issues because they require a linear search to identify or authenticate a tag. Some RFID protocols, however, only require constant time for tag identification, but, unfortunately, all previously proposed schemes of this type have serious shortcomings. We propose a novel RFID authentication protocol based on the Song-Mitchell protocol [21] , that takes O(1)
doi:10.1109/nss.2009.15
dblp:conf/nss/SongM09
fatcat:wog3cdbvcbdzbby6crunsmuu6y