@inproceedings{68c5bb4ae66845f5ab604d919e8e9aa7,
title = "Insider attacks and privacy of RFID protocols",
abstract = "We discuss insider attacks on RFID protocols with a focus on RFID tag privacy and demonstrate such attacks on published RFID protocols. In particular, we show attacks on a challenge-response protocol with IND-CCA1 encryption and on the randomized hashed GPS protocol. We then show that IND-CCA2 encryption can be used to prevent insider attacks and present a protocol secure against insider attacks. The protocol is based solely on elliptic-curve operations.",
author = "{van Deursen}, Ton and Sa{\v s}a Radomirovi{\'c}",
year = "2012",
doi = "10.1007/978-3-642-29804-2_6",
language = "English",
isbn = "9783642298035",
series = "Lecture Notes in Computer Science",
publisher = "Springer",
pages = "91--105",
booktitle = "Public Key Infrastructures, Services, and Applications. EuroPKI 2011",
note = "8th European Workshop on Public Key Infrastructures, Services, and Applications 2011, EuroPKI 2011 ; Conference date: 15-09-2011 Through 16-09-2011",
}