메뉴 건너뛰기




Volumn , Issue , 2013, Pages 578-582

HRP: A HMAC-based RFID mutual authentication protocol using PUF

Author keywords

HMAC; mutual authentication; PUF; RFID

Indexed keywords

AUTOMATIC IDENTIFICATION SYSTEM; CHALLENGE RESPONSE PROTOCOLS; CHALLENGE-RESPONSE PAIR; HMAC; MUTUAL AUTHENTICATION; MUTUAL AUTHENTICATION PROTOCOLS; PUF; RFID MUTUAL AUTHENTICATION PROTOCOLS;

EID: 84876769907     PISSN: 19767684     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICOIN.2013.6496690     Document Type: Conference Paper
Times cited : (34)

References (18)
  • 2
    • 84876747663 scopus 로고    scopus 로고
    • EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz Version 1. 2. 0, EPCglobal
    • EPC Radio-Frequency Identity Protocols Class-1 Generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz Version 1.2.0, EPCglobal
  • 7
    • 33144457479 scopus 로고    scopus 로고
    • RFID security and privacy: A research survey
    • Feb.
    • A. Juels, "RFID security and privacy: a research survey, " IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, Feb. 2006, pp. 381-394.
    • (2006) IEEE Journal on Selected Areas in Communications , vol.24 , Issue.2 , pp. 381-394
    • Juels, A.1
  • 9
    • 78751647847 scopus 로고    scopus 로고
    • Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
    • S-S. Yeo, J-S. Cho and S. K. Kim. "Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value, " Computer Communication, vol. 34, 2011 pp. 391-397.
    • (2011) Computer Communication , vol.34 , pp. 391-397
    • Yeo, S.-S.1    Cho, J.-S.2    Kim, S.K.3
  • 10
    • 33745654539 scopus 로고    scopus 로고
    • RFID-tags for anti-counterfeiting, topics in cryptology CT-RSA
    • P.Tuyls, L.Batina, "RFID-tags for Anti-Counterfeiting, Topics in Cryptology CT-RSA, " Lecture Notes in Computer Science, Vol.3860, 2006, pp.115-131
    • (2006) Lecture Notes in Computer Science , vol.3860 , pp. 115-131
    • Tuyls, P.1    Batina, L.2
  • 11
  • 13
    • 55349112850 scopus 로고    scopus 로고
    • A tamper-proof and lightweight authentication scheme
    • H.Ghaith, O.Erdinc, S.Berk, "A Tamper-Proof and Lightweight Authentication Scheme, ", Pervasive Mobile Computing, Vol.4(6), 2008, pp. 807-818.
    • (2008) Pervasive Mobile Computing , vol.4 , Issue.6 , pp. 807-818
    • Ghaith, H.1    Erdinc, O.2    Berk, S.3
  • 14
    • 77953303552 scopus 로고    scopus 로고
    • Lightweight mutual authentication and ownership transfer for RFID systems
    • March
    • L. Kulseng, Z. Yu, Y. Wei, and Y. Guan, "Lightweight Mutual Authentication and Ownership Transfer for RFID systems, " Proc. Of IEEE INFOCOM 2010, March 2010, pp. 1-5.
    • (2010) Proc. of IEEE INFOCOM 2010 , pp. 1-5
    • Kulseng, L.1    Yu, Z.2    Wei, Y.3    Guan, Y.4
  • 16
    • 84876749716 scopus 로고
    • SHA-1 Standard, Secure Hash Standard, FIPS PUB 180-1
    • National Institute of Standards and Technology (NIST), SHA-1 Standard, Secure Hash Standard, " FIPS PUB 180-1, www.itl.nist.gov/fipspubs/fip180-1. htm, 1995.
    • (1995)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.