-
3
-
-
70449375222
-
A security RFID authentication protocol based on hash function
-
Ternopil
-
T. Yu, Q. Feng, A Security RFID Authentication Protocol Based on Hash Function, in Information Engineering and Electronic Commerce, Ternopil, 2009, pp. 804-807.
-
(2009)
Information Engineering and Electronic Commerce
, pp. 804-807
-
-
Yu, T.1
Feng, Q.2
-
4
-
-
84903827490
-
On the security of mutual authentication protocols for RFID systems: The case of wei et al's protocol
-
M. Safkhani et al., On the Security of Mutual Authentication Protocols for RFID Systems: The Case of Wei et al's Protocol, LNCS, vol 7122, pp. 90-103, 2011.
-
(2011)
LNCS
, vol.7122
, pp. 90-103
-
-
Safkhani, M.1
-
5
-
-
79960317953
-
A RFID mutual authentication protocol based on hash
-
Jun
-
X. Wu, C. Tang, A RFID Mutual Authentication Protocol Based on Hash, Journal of Wuhan University of Technology (Transportation Science & Engineering), vol 35, no 3, pp. 571-574, Jun. 2011.
-
(2011)
Journal of Wuhan University of Technology (Transportation Science & Engineering)
, vol.35
, Issue.3
, pp. 571-574
-
-
Wu, X.1
Tang, C.2
-
6
-
-
83755168979
-
RFID mutual authentication protocols using key exchange based on hash functions
-
Dec
-
Seung-Jae Jang et al.,. RFID Mutual Authentication Protocols Using Key Exchange Based on Hash Functions. Communications in Computer and Information Science, vol 261, pp. 246-255, Dec. 2011.
-
(2011)
Communications in Computer and Information Science
, vol.261
, pp. 246-255
-
-
Jang, S.-J.1
-
7
-
-
78751647847
-
Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value
-
Mar
-
Jung-Sik Cho et al., Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value, Computer Communications, vol 34, no 3, pp. 391-397, Mar. 2011.
-
(2011)
Computer Communications
, vol.34
, Issue.3
, pp. 391-397
-
-
Cho, J.-S.1
-
8
-
-
84855354856
-
-
(Jan 14). (3rd ed.)[Online]
-
G. Bertoni et al.(2011, Jan 14). The Keccak reference(3rd ed.)[Online]. Available: http://keccak.noekeon.org
-
(2011)
The Keccak Reference
-
-
Bertoni, G.1
-
10
-
-
80155212157
-
Mutual authentication protocol based on hash function of RFID systems
-
Guilin
-
Lei-an Liu et al., Mutual Authentication Protocol Based on Hash Function of RFID Systems, in International Conference on Machine Learning and Cybernetics, Guilin, 2011, pp. 501-506.
-
(2011)
International Conference on Machine Learning and Cybernetics
, pp. 501-506
-
-
Liu, L.-A.1
-
11
-
-
79953083437
-
A mutual authentication protocol for RFID
-
Chia-Hui Wei et al., A Mutual Authentication Protocol for RFID, IT Professional, vol 13, no 2, pp. 20-24, 2011.
-
(2011)
IT Professional
, vol.13
, Issue.2
, pp. 20-24
-
-
Wei, C.-H.1
-
12
-
-
78650114205
-
A lightweight implementation of keccak hash function for radio-frequency identification applications
-
E. B. Kavun, T. Yalcin, A Lightweight Implementation of Keccak Hash Function for Radio-Frequency Identification Applications, LNCS, vol 6370, pp. 258-269, 2010.
-
(2010)
LNCS
, vol.6370
, pp. 258-269
-
-
Kavun, E.B.1
Yalcin, T.2
-
14
-
-
2942625823
-
Hash based enhancement of location privacy for radio frequency identification devices using varying identifiers
-
Washington, DC, USA
-
Henrici D., Muller P. Hash based enhancement of location privacy for radio frequency identification devices using varying identifiers. In: Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW 04), Washington, DC, USA, 2004, 149-153.
-
(2004)
Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW 04)
, pp. 149-153
-
-
Henrici, D.1
Muller, P.2
-
15
-
-
24644501824
-
Challenge response based RFID authentication protocol for distributed database environment
-
In D. Hutter, M. Ullmann eds. Berlin:Springer-Verlag
-
Rhee K., Kwak J., Kim S., Won D. Challenge Response Based RFID Authentication Protocol for Distributed Database Environment In D. Hutter, M. Ullmann eds. Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005). Lectures Notes in Computer Science 3450. Berlin:Springer-Verlag, 2005, 70-84.
-
(2005)
Proceedings of the 2nd International Conference on Security in Pervasive Computing(SPC 2005). Lectures Notes in Computer Science 3450
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
16
-
-
24944575863
-
Cryptographic approach to privacy-friendly tags
-
(MIT, Cambridge, MA, Nov. 15)
-
OHKUB M, SUZUKI K, KINOSHITA S. Cryptographic Approach to Privacy-Friendly Tags. Presented at the RFID Privacy Workshop (MIT, Cambridge, MA, Nov. 15 2003); rfidprivacy.ex.com/2003/agenda.php.
-
(2003)
Presented at the RFID Privacy Workshop
-
-
Ohkub, M.1
Suzuki, K.2
Kinoshita, S.3
|