메뉴 건너뛰기




Volumn 24, Issue 7, 2011, Pages 1300-1302

Vulnerabilities in Chen and Dengs RFID mutual authentication and privacy protection protocol

Author keywords

Cryptography; Mutual authentication; Protocol; RFID; Vulnerability

Indexed keywords

ACTIVE AREA; ENGINEERING APPLICATIONS; MUTUAL AUTHENTICATION; PRIVACY PROTECTION; PROTOCOL; SECURITY AND PRIVACY; VULNERABILITY;

EID: 80052262009     PISSN: 09521976     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.engappai.2011.06.011     Document Type: Article
Times cited : (10)

References (4)
  • 1
    • 70350572865 scopus 로고    scopus 로고
    • Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection
    • C.-L. Chen, and Y.-Y. Deng Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection Engineering Applications of Artificial Intelligence 22 2009 1284 1291
    • (2009) Engineering Applications of Artificial Intelligence , vol.22 , pp. 1284-1291
    • Chen, C.-L.1    Deng, Y.-Y.2
  • 2
    • 33947538532 scopus 로고    scopus 로고
    • Protocols for RFID tag/reader authentication
    • DOI 10.1016/j.dss.2007.01.003, PII S0167923607000103, Integrated Decision Support
    • S. Piramuthu Protocols for RFID tag/reader authentication Decision Support Systems 43 3 2007 897 914 (Pubitemid 46466997)
    • (2007) Decision Support Systems , vol.43 , Issue.3 , pp. 897-914
    • Piramuthu, S.1
  • 3
    • 78650176848 scopus 로고    scopus 로고
    • RFID mutual authentication protocols
    • S. Piramuthu RFID mutual authentication protocols Decision Support Systems 50 2 2010 387 393
    • (2010) Decision Support Systems , vol.50 , Issue.2 , pp. 387-393
    • Piramuthu, S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.