Download now Free registration required
Recent emergence of high-end RFID tags capable of performing public key operations enables some new applications in commerce (e.g., RFID-enabled credit cards) and security (e.g., ePassports and access control badges). While the use of public key cryptography mitigates many difficult security issues, certain important usability-related issues remain, particularly, when RFID tags are used for financial transactions or bearer identification. In this paper, the authors focus on user-involved techniques for user-to-tag authentication, transaction verification, reader expiration & revocation checking, as well as pairing of RFID tags with other personal devices.
- Format: PDF
- Size: 1205.7 KB