-
1
-
-
78751647681
-
The design of RFID access control protocol using the strategy of indefinite-index and challenge-response
-
Y.-Y. Chen, M.-L. Tsai, and J.-K. Jan. The design of RFID access control protocol using the strategy of indefinite-index and challenge-response. In Computer Communication, volume 34, pages 250-256, 2011.
-
(2011)
Computer Communication
, vol.34
, pp. 250-256
-
-
Chen, Y.-Y.1
Tsai, M.-L.2
Jan, J.-K.3
-
2
-
-
36248982045
-
SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
-
DOI 10.1109/TDSC.2007.70226
-
H.-Y. Chien. SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity. IEEE Transactions on Dependable and Secure Computing, 4(4):337-340, December 2007. (Pubitemid 350125898)
-
(2007)
IEEE Transactions on Dependable and Secure Computing
, vol.4
, Issue.4
, pp. 337-340
-
-
Chien, H.-Y.1
-
3
-
-
78751647847
-
Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
-
doi:10.1016/j.comcom.2010.02.029
-
J.-S. Cho, S.-S. Yeo, and S. K. Kim. Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value. In Comput.Commun,doi:10.1016/j.comcom.2010.02.029, 2010.
-
(2010)
Comput.Commun
-
-
Cho, J.-S.1
Yeo, S.-S.2
Kim, S.K.3
-
5
-
-
34548162681
-
Vulnerability analysis of EMAP-an efficient RFID mutual authentication protocol
-
IEEE Computer Society
-
T. Li and R. H. Deng. Vulnerability analysis of EMAP-an efficient RFID mutual authentication protocol. In ARES, pages 238-245. IEEE Computer Society, 2007.
-
(2007)
ARES
, pp. 238-245
-
-
Li, T.1
Deng, R.H.2
-
7
-
-
70350625235
-
Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol
-
K.-I. Chung, K. Sohn, and M. Yung, editors, WISA, Springer
-
P. Peris-Lopez, J. C. H. Castro, J. M. Estévez-Tapiador, and A. Ribagorda. Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol. In K.-I. Chung, K. Sohn, and M. Yung, editors, WISA, volume 5379 of LNCS, pages 56-68. Springer, 2008.
-
(2008)
LNCS
, vol.5379
, pp. 56-68
-
-
Peris-Lopez, P.1
Castro, J.C.H.2
Estévez-Tapiador, J.M.3
Ribagorda, A.4
-
9
-
-
65649112157
-
Security analysis of the Song Mitchell authentication protocol for low-cost RFID tags
-
P. Rizomiliotis, E. Rekleitis, and S. Gritzalis. Security analysis of the Song Mitchell authentication protocol for low-cost RFID tags. In IEEE Communications Letters, volume 13, pages 274-276, 2009.
-
(2009)
IEEE Communications Letters
, vol.13
, pp. 274-276
-
-
Rizomiliotis, P.1
Rekleitis, E.2
Gritzalis, S.3
-
10
-
-
66649092625
-
FLMAP: A fast lightweight mutual authentication protocol for RFID systems
-
IEEE
-
A. Sadighian and R. Jalili. FLMAP: A fast lightweight mutual authentication protocol for RFID systems. In ICON, pages 1-6. IEEE, 2008.
-
(2008)
ICON
, pp. 1-6
-
-
Sadighian, A.1
Jalili, R.2
-
11
-
-
70449478156
-
AFMAP: Anonymous forward-secure mutual authentication protocols for RFID systems
-
R. Falk, W. Goudalo, E. Y. Chen, R. Savola, and M. Popescu, editors, Athens, Greece. IEEE Computer Society
-
A. Sadighian and R. Jalili. AFMAP: Anonymous Forward-Secure Mutual Authentication Protocols for RFID systems. In R. Falk, W. Goudalo, E. Y. Chen, R. Savola, and M. Popescu, editors, The Third IEEE International Conference on Emerging Security Information, Systems and Technologies(SECURWARE 2009), pages 31-36, Athens, Greece, 2009. IEEE Computer Society.
-
(2009)
The Third IEEE International Conference on Emerging Security Information, Systems and Technologies(SECURWARE 2009)
, pp. 31-36
-
-
Sadighian, A.1
Jalili, R.2
-
14
-
-
77957362882
-
Cryptanalysis of AFMAP
-
M. Safkhani, M. Naderi, and N. Bagheri. Cryptanalysis of AFMAP. IEICE Electronics Express, 7(17):1240-1245, 2010.
-
(2010)
IEICE Electronics Express
, vol.7
, Issue.17
, pp. 1240-1245
-
-
Safkhani, M.1
Naderi, M.2
Bagheri, N.3
-
15
-
-
80455174998
-
Cryptanalysis of some protocols for RFID systems
-
M. Safkhani, M. Naderi, N. Bagheri, and S. K. Sanadhya. Cryptanalysis of some protocols for RFID systems. Cryptology ePrint Archive, Report 2011/061, 2011. http://eprint.iacr.org/.
-
(2011)
Cryptology EPrint Archive, Report 2011/061
-
-
Safkhani, M.1
Naderi, M.2
Bagheri, N.3
Sanadhya, S.K.4
-
16
-
-
84857471319
-
Cryptanalysis of the fast lightweight mutual authentication protocol (FLMAP)
-
3
-
M. Safkhani, M. Naderi, and H. F.Rashvand. Cryptanalysis of the Fast Lightweight Mutual Authentication Protocol (FLMAP). International Journal of Computer & Communication Technology (IJCCT), 2(2,3,4):182-186, 2010.
-
(2010)
International Journal of Computer & Communication Technology (IJCCT)
, vol.2
, Issue.2-4
, pp. 182-186
-
-
Safkhani, M.1
Naderi, M.2
Rashvand, H.F.3
-
18
-
-
56749103027
-
RFID authentication protocol for low-cost tags
-
B. Song and C. J. Mitchell. RFID Authentication Protocol for Low-cost Tags. In WiSec' 08, pages 140-147, 2008.
-
(2008)
WiSec'08
, pp. 140-147
-
-
Song, B.1
Mitchell, C.J.2
-
19
-
-
67649484364
-
A Gen2-based RFID authentication protocol for security and privacy
-
H.-M. Sun and W.-C. Ting. A Gen2-Based RFID Authentication Protocol for Security and Privacy. In IEEE Transactions On Mobile Computing, volume 8, pages 1052-1062, 2009.
-
(2009)
IEEE Transactions on Mobile Computing
, vol.8
, pp. 1052-1062
-
-
Sun, H.-M.1
Ting, W.-C.2
-
20
-
-
85008055668
-
Secure and serverless RFID authentication and search protocols
-
C. C. Tan, B. Sheng, and Q. Li. Secure and Serverless RFID Authentication and Search Protocols. IEEE Transactions on Wireless Communications, 7(4):1400-1407, 2008.
-
(2008)
IEEE Transactions on Wireless Communications
, vol.7
, Issue.4
, pp. 1400-1407
-
-
Tan, C.C.1
Sheng, B.2
Li, Q.3
-
21
-
-
79953083437
-
A mutual authentication protocol for rfid
-
C.-H. Wei, M.-S. Hwang, and A. Y. Chin. A mutual authentication protocol for rfid. IT Professional, 13(2):20-24, 2011.
-
(2011)
IT Professional
, vol.13
, Issue.2
, pp. 20-24
-
-
Wei, C.-H.1
Hwang, M.-S.2
Chin, A.Y.3
|