4 research outputs found

    Analysis on the Performance of Server-less RFID Searching Protocol

    Get PDF
    Radio frequency identification (RFID) has spread into many fields. Its security and privacy has received more and more attention. Based on traditional authentication protocols, some other branches related to practical applications have been introduced including server-less authentication and searching protocols. The server-less searching protocol is extended from server-less authentication protocol and both of them are executedwithout the support from the backend servers. Through analyzing some proposed protocols, we found that the probabilistic tracking attack is one of the major threats on the serverless RFID security protocols. The probability of being tracked and the cost on computation are related with the probability of the undesired tagā€™s response. Based on the analysis, a practical conclusion is given which can be used in most of the server-less RFID systems

    Guest Editorial

    Get PDF
    Network security is a continuing endeavor as exhibited by this special issue on the subject. Although the problem of securing networks emerged almost simultaneously with their development, attaining a fixed set of complete solutions remains evasive. In the history of the development of computers and networking, solutions to challenging problems have become touchstones, and from among them we can draw a parallel to the current state of network development

    Author Index

    Get PDF
    Author Index: CIT Vol. 23 (2015), No 1ā€“
    corecore