메뉴 건너뛰기




Volumn 16, Issue 5, 2014, Pages 369-375

On the security of Moessner's and Khan's authentication scheme for passive EPCglobal C1G2 RFID tags

Author keywords

Authentication; Hash function; Privacy; RFID; Security

Indexed keywords

AUTHENTICATION; DATA PRIVACY; HASH FUNCTIONS; INTERNET OF THINGS;

EID: 84903879790     PISSN: 1816353X     EISSN: 18163548     Source Type: Journal    
DOI: None     Document Type: Article
Times cited : (7)

References (12)
  • 1
    • 77949553535 scopus 로고    scopus 로고
    • 'Cryptanalysis of two RFID authentication protocols'
    • T. Cao and P. Shen, "Cryptanalysis of two RFID authentication protocols," International journal of network security, vol. 9, pp. 95-100, 2009.
    • (2009) International journal of network security , vol.9 , pp. 95-100
    • Cao, T.1    Shen, P.2
  • 3
    • 79953072900 scopus 로고    scopus 로고
    • 'RFID ownership transfer authorization systems conforming EPCglobal class-1 generation-2 standards'
    • C. L. Chen, Y. L. Lai, C. C. Chen, Y. Y. Deng, and Y. C. Hwang, "RFID ownership transfer authorization systems conforming EPCglobal class-1 generation-2 standards," International Journal of Network Security, vol. 13, pp. 41-48, 2011.
    • (2011) International Journal of Network Security , vol.13 , pp. 41-48
    • Chen, C.L.1    Lai, Y.L.2    Chen, C.C.3    Deng, Y.Y.4    Hwang, Y.C.5
  • 5
    • 67349277179 scopus 로고    scopus 로고
    • 'PAP: A privacy and authentication protocol for passive RFID tags'
    • A. X. Liu and L. A. Bailey, "PAP: A privacy and authentication protocol for passive RFID tags," Computer Communications, vol. 32, pp. 1194-1199, 2009.
    • (2009) Computer Communications , vol.32 , pp. 1194-1199
    • Liu, A.X.1    Bailey, L.A.2
  • 6
    • 84655161367 scopus 로고    scopus 로고
    • 'Secure authentication scheme for passive C1G2 RFID tags'
    • M. Moessner and G. N. Khan, "Secure authentication scheme for passive C1G2 RFID tags," Computer Networks, vol. 56, pp. 273-286, 2012.
    • (2012) Computer Networks , vol.56 , pp. 273-286
    • Moessner, M.1    Khan, G.N.2
  • 8
    • 67649484364 scopus 로고    scopus 로고
    • 'A Gen2-based RFID authentication protocol for security and privacy'
    • Aug. 2009
    • H. M. Sun and W. C. Ting, "A Gen2-based RFID authentication protocol for security and privacy," IEEE Transactions on Mobile Computing, vol. 8, pp. 1052-1062, Aug. 2009 2009.
    • (2009) IEEE Transactions on Mobile Computing , vol.8 , pp. 1052-1062
    • Sun, H.M.1    Ting, W.C.2
  • 10
    • 79953083437 scopus 로고    scopus 로고
    • 'A mutual authentication protocol for RFID'
    • C. H. Wei, M. S. Hwang, and A. Y. H. Chin, "A mutual authentication protocol for RFID," IT Professional, vol. 13, pp. 20-24, 2011.
    • (2011) IT Professional , vol.13 , pp. 20-24
    • Wei, C.H.1    Hwang, M.S.2    Chin, A.Y.H.3
  • 11
    • 84866074525 scopus 로고    scopus 로고
    • 'An improved authentication protocol for mobile agent device in RFID environment'
    • C. H. Wei, M. S. Hwang, and A. Y. H. Chin, "An improved authentication protocol for mobile agent device in RFID environment," International Journal of Mobile Communications, vol. 10, pp. 508-520, 2012.
    • (2012) International Journal of Mobile Communications , vol.10 , pp. 508-520
    • Wei, C.H.1    Hwang, M.S.2    Chin, A.Y.H.3
  • 12
    • 77958017166 scopus 로고    scopus 로고
    • 'Security requirements for RFID computing systems'
    • X. Zhang and B. King, "Security requirements for RFID computing systems," International Journal of Network Security, vol. 6, pp. 214-226, 2008.
    • (2008) International Journal of Network Security , vol.6 , pp. 214-226
    • Zhang, X.1    King, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.