메뉴 건너뛰기




Volumn , Issue , 2011, Pages 774-778

A novel hash-based RFID mutual authentication protocol

Author keywords

Hash function; Mutual authentication; RFID; Secure protocol

Indexed keywords

CHAIN MANAGEMENT; HASH VALUE; MUTUAL AUTHENTICATION; PSEUDO RANDOM NUMBER GENERATORS; RANDOM NUMBERS; RFID SYSTEMS; SECRET KEY; SECURE PROTOCOLS; SECURITY AND PRIVACY; SECURITY LEVEL;

EID: 84863064501     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/CIS.2011.176     Document Type: Conference Paper
Times cited : (9)

References (13)
  • 3
    • 79953072900 scopus 로고    scopus 로고
    • RFID ownership transfer authorization systems conforming EPC global class 1 generation 2 standards
    • C.L. Chen et al. RFID Ownership Transfer Authorization Systems Conforming EPC global Class 1 Generation 2 Standards. In International Journal of Network Security, 13(1): 41-48, 2011.
    • (2011) International Journal of Network Security , vol.13 , Issue.1 , pp. 41-48
    • Chen, C.L.1
  • 7
    • 33750397049 scopus 로고    scopus 로고
    • Securing ubiquitous and low-cost RFID using tiny encryption algorithm
    • Institute of Electrical and Electronic Engineers (IEEE-2006), pages 124
    • P. Israsena. Securing ubiquitous and low-cost RFID using tiny encryption algorithm. In the 1st International Symposium on wireless pervasive Computing, Institute of Electrical and Electronic Engineers (IEEE-2006), pages 124, 2006.
    • (2006) The 1st International Symposium on Wireless Pervasive Computing
    • Israsena, P.1
  • 8
    • 77949553535 scopus 로고    scopus 로고
    • Cryptanalysis of two RFID authentication protocols
    • T. Cao and P. Shen. Cryptanalysis of two RFID authentication protocols. In International Journal of Network Security, 9(1): 95-100, 2009.
    • (2009) International Journal of Network Security , vol.9 , Issue.1 , pp. 95-100
    • Cao, T.1    Shen, P.2
  • 9
    • 57749119310 scopus 로고    scopus 로고
    • Identifying RFID embedded objects in pervasive healthcare applications
    • Y.J. Tu, W. Zhou, and S. Piramuthu. Identifying RFID Embedded Objects in Pervasive Healthcare Applications. In Decision Support Systems, 46(2): 586-593, 2009.
    • (2009) Decision Support Systems , vol.46 , Issue.2 , pp. 586-593
    • Tu, Y.J.1    Zhou, W.2    Piramuthu, S.3
  • 12
    • 68349135272 scopus 로고    scopus 로고
    • Classification of RFID adoption: An expected benefits approach
    • J.J. Roh, A. Kunnathur and M. Tarafdar. Classification of RFID Adoption: An Expected Benefits Approach. In Information & Management, 46(6): 357-363, 2009.
    • (2009) Information & Management , vol.46 , Issue.6 , pp. 357-363
    • Roh, J.J.1    Kunnathur, A.2    Tarafdar, M.3
  • 13
    • 70350572865 scopus 로고    scopus 로고
    • Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection
    • C.L. Chen, Y.Y. Deng. Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection. In Engineering Applications of Artificial Intelligence, 22(8): 1284-1291, 2009.
    • (2009) Engineering Applications of Artificial Intelligence , vol.22 , Issue.8 , pp. 1284-1291
    • Chen, C.L.1    Deng, Y.Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.