Oct. 20, 2022, 1:20 a.m. | Shaoying Cai, Yingjiu Li, Changshe Ma, Sherman S. M. Chow, Robert H. Deng

cs.CR updates on arXiv.org arxiv.org

Radio Frequency Identification (RFID) is a key technology used in many
applications. In the past decades, plenty of secure and privacy-preserving RFID
tag/mutual authentication protocols as well as formal frameworks for evaluating
them have been proposed. However, we notice that a property, namely proof of
possession (PoP), has not been rigorously studied till now, despite it has
significant value in many RFID applications. For example, in RFID-enabled
supply chains, PoP helps prevent dis-honest parties from publishing information
about products/tags that …

authentication beyond tag

SOC 2 Manager, Audit and Certification

@ Deloitte | US and CA Multiple Locations

Advisory Red Consultant

@ Security Risk Advisors | Philadelphia, Pennsylvania, United States

Cyber Business Transformation Change Analyst

@ National Grid | Warwick, GB, CV34 6DA

Cyber Security Analyst

@ Ford Motor Company | Mexico City, MEX, Mexico

Associate Administrator, Cyber Security Governance (Fort Myers)

@ Millennium Physician Group | Fort Myers, FL, United States

Embedded GSOC Lead Operator, Events

@ Sibylline Ltd | Seattle, WA, United States