搜索结果: 1-8 共查到“军事学 ownership transfer”相关记录8条 . 查询时间(0.093 秒)
KP+ : Fixing Availability Issues on KP Ownership Transfer Protocols
RFID cryptanalysis privacy
2016/12/8
Ownership Transfer Protocols for RFID allow transferring the rights over a tag from a current owner to a new owner in a secure and private way. Recently, Kapoor and Piramuthu have proposed two schemes...
Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments
cryptanalysis anonymity RFID
2016/1/5
Sundaresan et al proposed recently a novel ownership transfer protocol for multi-tag multi-owner RFID environments that complies with the EPC Class1 Generation2 standard. The authors claim that this p...
Enhanced Ownership Transfer Protocol for RFID in an Extended Communication Model
RFID Ownership Transfer Protocols Privacy Key Change Protocol
2013/4/18
Ownership Transfer Protocols for RFID allow transferring the rights over a tag from a current owner to a new owner in a secure and private way. Recently, Kapoor and Piramuthu have proposed two schemes...
An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer
RFID Privacy Security Ownership Transfer Protocol
2012/6/14
Radio Frequency IDentification based systems, which are the most famous example of ubiquitous networks, are getting pervasively deployed in many daily life applications where privacy sensitivity is en...
An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer
RFID Privacy Security Ownership Transfer Protocol
2012/3/20
Radio Frequency IDentification based systems, which are the most famous example of ubiquitous networks, are getting pervasively deployed in many daily life applications where privacy sensitivity is en...
An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer
RFID Privacy Security Ownership Transfer Protocol
2012/8/28
Radio Frequency IDentification based systems, which are the most famous example of ubiquitous networks, are getting pervasively deployed in many daily life applications where privacy sensitivity is en...
ROTIV: RFID Ownership Transfer with Issuer Verification
RFID ownership transfer issuer verification
2010/12/14
RFID tags travel between partner sites in a supply chain. For privacy reasons, each partner “owns” the tags present at his site, i.e., the owner is the only entity able to authenticate his tags. Howev...
A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags
RFID privacy pseudonym protocol cryptography
2009/3/4
The ability to link two different sightings of the same Radio
Frequency Identification (RFID) tag enables invasions of privacy. The
problem is aggravated when an item, and the tag attached to it, ch...