Analyses of attacks on embedded RFID application under U-healthcare system

0Citations
Citations of this article
3Readers
Mendeley users who have this article in their library.
Get full text

Abstract

A variety of security and privacy threats to RFID authentication protocols have been widely studied, including eavesdropping, replay attacks, denial of service (DoS) attacks, tracking, and traceability. Considering this RFID security issues, we surveyed the security threats and open problems related to issues by means of information security and privacy. In this paper, we have analyzed and compared practical threat on U-healthcare system. © 2013 Springer Science+Business Media Dordrecht.

Cite

CITATION STYLE

APA

Kim, J. T. (2013). Analyses of attacks on embedded RFID application under U-healthcare system. In Lecture Notes in Electrical Engineering (Vol. 235 LNEE, pp. 1039–1043). https://doi.org/10.1007/978-94-007-6516-0_114

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free