%0 Conference Proceedings %T Cryptanalysis of an RFID Tag Search Protocol Preserving Privacy of Mobile Reader %+ Kyungil University %A Yoon, Eun-Jun %Z Part 13: UMAS %< avec comité de lecture %( Lecture Notes in Computer Science %B 9th International Conference on Network and Parallel Computing (NPC) %C Gwangju, South Korea %Y James J. Park %Y Albert Zomaya %Y Sang-Soo Yeo %Y Sartaj Sahni %I Springer %3 Network and Parallel Computing %V LNCS-7513 %P 575-580 %8 2012-09-06 %D 2012 %R 10.1007/978-3-642-35606-3_68 %K RFID %K Privacy %K DoS attack %K Serverless search %K Passive tag %Z Computer Science [cs]Conference papers %X RFID tag search system can be used to find a particular tag among numerous tags. In 2011, Chun et al. proposed an RFID tag search protocol preserving privacy of mobile reader holders. Chun et al. claimed that their proposed protocol can withstand five attacks to be considered in serverless search protocols, such as tracking, cloning, eavesdropping, physical, and Denial of Service (DoS) attacks. However, this paper points out that the Chun et al.’s protocol still can be vulnerable to the DoS attack. %G English %Z TC 10 %Z WG 10.3 %2 https://inria.hal.science/hal-01551322/document %2 https://inria.hal.science/hal-01551322/file/978-3-642-35606-3_68_Chapter.pdf %L hal-01551322 %U https://inria.hal.science/hal-01551322 %~ IFIP-LNCS %~ IFIP %~ IFIP-AICT %~ IFIP-TC %~ IFIP-TC10 %~ IFIP-NPC %~ IFIP-WG10-3 %~ IFIP-LNCS-7513