Zhang, Xiaowen; Zhang, Zhanyang; Wei, Xinzhou - In: International Journal of Applied Logistics (IJAL) 2 (2011) 1, pp. 76-84
This study extends the vulnerability analysis of a RFID authentication protocol and offers solutions to security weaknesses through enhanced measures. Vajda and Buttyan (VB) proposed a lightweight RFID authentication protocol, called XOR. Defend, Fu, and Juels (DFJ) analyzed it and proposed...