Download Now Free registration required
Radio Frequency IDentification (RFID) technology is increasingly used in many aspects of daily life. Low-cost RFID devices have numerous applications in military, commercial and medical domains. In most of these applications, an RFID reader must authenticate its designated tags to prevent tag forgery and counterfeiting. At the same time, privacy concerns in many of these applications dictate that the tag's identity is not revealed to an attacker, even while the tag authenticates itself (and even if the attacker pretends to be a reader). RFID tags are typically very low-cost devices and their computation and storage capabilities are severely constrained.
- Format: PDF
- Size: 192.81 KB