8
Views
0
CrossRef citations to date
0
Altmetric
Original Articles

Passive Enumeration of Secret Information in LMAP and M2AP RFID Authentication Protocols

Pages 4-14 | Published online: 07 Jul 2014

References

  • Avoine, G. RFID Security & Privacy Lounge available at: http://www.avoine.net/rfid/ (accessed on 10/15/2012).
  • Bárász, M. Boros, B. Ligeti, P. Lója, K. Nagy, D.A. (2007). Breaking LMAP. Conference on RFID Security.
  • Kapoor, G. & Piramuthu, S. (2012). Single RFID Tag Ownership Transfer Protocols. IEEE Transactions on Systems, Man, and Cybernetics-C, 42(2), 164–173.
  • Li, T. & Wang, G. (2007). Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols. 22nd IFIP TC-11 International Information Security Conference, Springer, Volume 232, pp 109–120.
  • Ouafi, K. & Phan, R.C.-W. (2008). Privacy of Recent RFID Authentication Protocols. Information Security Practice and Experience, Lecture Notes in Computer Science, Volume 4991/2008, 263–277.
  • Peris-Lopez, P. Hernandez-Castro, J.C. Tapiador, J.M.E. & Ribagorda, A. (2006a). M2AP: A Minimalist Mutual-Authentication Protocol for Low-cost RFID Tags. International Conference on Ubiquitous Intelligence and Computing (UIC'06), Springer LNCS 4159, pp. 912–923.
  • Peris-Lopez, P. Hernandez-Castro, J.C. Tapiador, J.M.E. & Ribagorda, A. (2006b). LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID Tags. Workshop on RFID Security..
  • Piramuthu, S. (2008). Adaptive Framework for Collisions in RFID Tag Identification. Journal of Information & Knowledge Management, 7(1), 9–14.
  • Mitrokotsa, A. Rieback, M.R. Tanenbaum, A.S. (2010). Classifying RFID attacks and defenses. Information Systems Frontiers 12(5), 491–505.

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.