Open access peer-reviewed chapter

Security Analysis of the RFID Authentication Protocol Using Model Checking

By Hyun-Seok Kim, Jin-Young Choi, and Sin-Jae Lee

Submitted: May 31st 2010Reviewed: July 5th 2010Published: February 10th 2011

DOI: 10.5772/14825

Downloaded: 1366

How to cite and reference

Link to this chapter Copy to clipboard

Cite this chapter Copy to clipboard

Hyun-Seok Kim, Jin-Young Choi, and Sin-Jae Lee (February 10th 2011). Security Analysis of the RFID Authentication Protocol Using Model Checking, Ubiquitous Computing, Eduard Babkin, IntechOpen, DOI: 10.5772/14825. Available from:

Embed this chapter on your site Copy to clipboard

<iframe src="http://www.intechopen.com/embed/ubiquitous-computing/security-analysis-of-the-rfid-authentication-protocol-using-model-checking" />

Embed this code snippet in the HTML of your website to show this chapter

chapter statistics

1366total chapter downloads

More statistics for editors and authors

Login to your personal dashboard for more detailed statistics on your publications.

Access personal reporting

Related Content

This Book

Next chapter

On Modeling of Ubiquitous Computing Environments Featuring Privacy

By Vivian C. Kalempa, Rodrigo Campiolo, Lucas Guardalben, Urian K. Bardemaker, João Bosco M. Sobral

Related Book

First chapter

Handling Variability and Traceability over SPL Disciplines

By Yguarată Cerqueira Cavalcanti, Ivan do Carmo Machado, Paulo Anselmo da Mota Silveira Neto and Luanna Lopes Lobato

We are IntechOpen, the world's leading publisher of Open Access books. Built by scientists, for scientists. Our readership spans scientists, professors, researchers, librarians, and students, as well as business professionals. We share our knowledge and peer-reveiwed research papers with libraries, scientific and engineering societies, and also work with corporate R&D departments and government entities.

More about us