-
1
-
-
76849106311
-
Universally composable RFID identification and authentication protocols
-
Burmester M, Le TV, Medeiros BD, Tsudik G (2009) Universally composable RFID identification and authentication protocols. ACM Trans Inf Syst Secur (TISSEC) 12(4):21
-
(2009)
ACM Trans Inf Syst Secur (TISSEC)
, vol.12
, Issue.4
, pp. 21
-
-
Burmester, M.1
Le, T.V.2
Medeiros, B.D.3
Tsudik, G.4
-
2
-
-
34748832806
-
Defining strong privacy for RFID. Cryptology ePrint Archive
-
Juels A, Weis S (2006) Defining strong privacy for RFID. Cryptology ePrint Archive, Report 2006/137
-
(2006)
Report
, vol.2006
, Issue.137
-
-
Juels, A.1
Weis, S.2
-
3
-
-
70349155465
-
Attacks and improvements to an RIFD mutual authentication protocol and its extensions. In: Proceedings of the second ACM conference on wireless network security
-
Cai S, Li Y, Li T, Deng RH (2009) Attacks and improvements to an RIFD mutual authentication protocol and its extensions. In: Proceedings of the second ACM conference on wireless network security, pp 51–58
-
(2009)
pp 51–58
-
-
Cai, S.1
Li, Y.2
Li, T.3
Deng, R.H.4
-
4
-
-
79151469014
-
Scalable RFID security protocols supporting tag ownership transfer
-
Song B, Mitchell CJ (2011) Scalable RFID security protocols supporting tag ownership transfer. Comput Commun 34(4):556–566
-
(2011)
Comput Commun
, vol.34
, Issue.4
, pp. 556-566
-
-
Song, B.1
Mitchell, C.J.2
-
5
-
-
84903725812
-
Privacy and authentication protocol for mobile RFID systems. Wirel Pers Commun
-
Niu B, Zhu X, Chi H, Li H (2014) Privacy and authentication protocol for mobile RFID systems. Wirel Pers Commun. doi:10.1007/s11277-014-1605-6
-
(2014)
doi:10.1007/s11277-014-1605-6
-
-
Niu, B.1
Zhu, X.2
Chi, H.3
Li, H.4
-
7
-
-
84894523791
-
Improvement of the hash-based RFID mutual authentication protocol. Wirel Pers Commun
-
Dehkordi MH, Farzaneh Y (2013) Improvement of the hash-based RFID mutual authentication protocol. Wirel Pers Commun. doi:10.1007/s11277-013-1358-7
-
(2013)
doi:10.1007/s11277-013-1358-7
-
-
Dehkordi, M.H.1
Farzaneh, Y.2
-
8
-
-
84889098244
-
Cryptanalysis of the Cho et al. protocol: a hash-based RFID tag mutual authentication protocol
-
Safkhani M, Peris-Lopez P, Hernandez-Castro JC, Bagheri N (20174) Cryptanalysis of the Cho et al. protocol: a hash-based RFID tag mutual authentication protocol. J Comput Appl Math 259(1):571–577
-
J Comput Appl Math
, vol.259
, Issue.1
, pp. 571-577
-
-
Safkhani, M.1
Peris-Lopez, P.2
Hernandez-Castro, J.C.3
Bagheri, N.4
-
9
-
-
84903597022
-
-
Simulation-based traceability analysis of RFID authentication protocols, Wirel Pers Commun:
-
Alagheband MR, Aref MR (2013) Simulation-based traceability analysis of RFID authentication protocols. Wirel Pers Commun. doi:10.1007/s11277-013-1552-7
-
(2013)
Aref MR
-
-
Alagheband, M.R.1
-
10
-
-
84872223019
-
A novel mutual authentication scheme for RFID conforming EPCglobal class 1 generation 2 standards
-
Chen CL, Huang YC, Shih TF (2012) A novel mutual authentication scheme for RFID conforming EPCglobal class 1 generation 2 standards. Inf Technol Control 41(3):220–228
-
(2012)
Inf Technol Control
, vol.41
, Issue.3
, pp. 220-228
-
-
Chen, C.L.1
Huang, Y.C.2
Shih, T.F.3
-
11
-
-
84878975743
-
Secure indefinite-index RFID authentication scheme with challenge-response strategy
-
Kuo WC, Chen BL, Wuu LC (2013) Secure indefinite-index RFID authentication scheme with challenge-response strategy. Inf Technol Control 42(2):124–130
-
(2013)
Inf Technol Control
, vol.42
, Issue.2
, pp. 124-130
-
-
Kuo, W.C.1
Chen, B.L.2
Wuu, L.C.3
-
12
-
-
84880314449
-
Unified privacy analysis of newfound RFID authentication protocols
-
Alagheband MR, Aref MR (2013) Unified privacy analysis of newfound RFID authentication protocols. Secur Commun Netw 6(8):999–1009
-
(2013)
Secur Commun Netw
, vol.6
, Issue.8
, pp. 999-1009
-
-
Alagheband, M.R.1
Aref, M.R.2
-
14
-
-
54049143316
-
Elliptic curve based security processor for RFID
-
Lee YK, Sakiyama K, Batina L, Verbauwhede I (2008) Elliptic curve based security processor for RFID. IEEE Trans Comput 57(11):1514–1527
-
(2008)
IEEE Trans Comput
, vol.57
, Issue.11
, pp. 1514-1527
-
-
Lee, Y.K.1
Sakiyama, K.2
Batina, L.3
Verbauwhede, I.4
-
15
-
-
84919879124
-
-
N.N.I., Technology of Standards: Cryptographic hash algorithm competition
-
N.N.I., Technology of Standards: Cryptographic hash algorithm competition. http://csrc.nist.gov/groups/ST/hash/sha-3/index.html
-
-
-
-
16
-
-
80053220372
-
Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems
-
Ning H, Liu H, Mao J, Zhang Y (2011) Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems. IET Commun 5(12):1755–1768
-
(2011)
IET Commun
, vol.5
, Issue.12
, pp. 1755-1768
-
-
Ning, H.1
Liu, H.2
Mao, J.3
Zhang, Y.4
-
17
-
-
84863515660
-
Scalable RFID systems: a privacy-preserving protocol with constant-time identification
-
Alomair B, Clark A, Cuellar J, Poovendran R (2012) Scalable RFID systems: a privacy-preserving protocol with constant-time identification. IEEE Trans Parallel Distrib Syst 23(8):1536–1550
-
(2012)
IEEE Trans Parallel Distrib Syst
, vol.23
, Issue.8
, pp. 1536-1550
-
-
Alomair, B.1
Clark, A.2
Cuellar, J.3
Poovendran, R.4
-
18
-
-
78049383154
-
Privacy versus scalability in radio frequency identification systems
-
Alomair B, Poovendran R (2010) Privacy versus scalability in radio frequency identification systems. Comput Commun 33(18):2155–2163
-
(2010)
Comput Commun
, vol.33
, Issue.18
, pp. 2155-2163
-
-
Alomair, B.1
Poovendran, R.2
-
19
-
-
79151469014
-
Scalable RFID security protocols supporting tag ownership transfer
-
Song B, Mitchell CJ (2011) Scalable RFID security protocols supporting tag ownership transfer. Comput Commun 34(4):556–566
-
(2011)
Comput Commun
, vol.34
, Issue.4
, pp. 556-566
-
-
Song, B.1
Mitchell, C.J.2
-
20
-
-
84860886134
-
Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs
-
Batina L, Lee YK, Seys S, Singele D, Verbauwhede I (2012) Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs. Pers Ubiquitous Comput 16(3):323–335
-
(2012)
Pers Ubiquitous Comput
, vol.16
, Issue.3
, pp. 323-335
-
-
Batina, L.1
Lee, Y.K.2
Seys, S.3
Singele, D.4
Verbauwhede, I.5
-
21
-
-
84907591223
-
An efficient mutual authentication RFID scheme based on elliptic curve cryptography. J Supercomput
-
Chou JS (2013) An efficient mutual authentication RFID scheme based on elliptic curve cryptography. J Supercomput. doi:10.1007/s11227-013-1073-x
-
(2013)
doi:10.1007/s11227-013-1073-x
-
-
Chou, J.S.1
-
23
-
-
84919879122
-
Efficient identification and signatures for smart cards. In: Advances in cryptology (CRYPTO’89)
-
Schnorr CP (1990) Efficient identification and signatures for smart cards. In: Advances in cryptology (CRYPTO’89), pp 239–252
-
(1990)
pp 239–252
-
-
Schnorr, C.P.1
-
24
-
-
34547688845
-
Public-key cryptography for RFID-tags
-
Batina L, Guajardo J, Kerins T, Mentens N, Tuyls P, Verbauwhede I (2007) Public-key cryptography for RFID-tags. In: Fifth annual IEEE international conference on pervasive computing and communications workshops, 2007. (PerCom Workshops’07), pp 217–222
-
(2007)
Fifth annual IEEE international conference on pervasive computing and communications workshops
, vol.2007
, Issue.PerCom Workshops’07
, pp. 217-222
-
-
Batina, L.1
Guajardo, J.2
Kerins, T.3
Mentens, N.4
Tuyls, P.5
Verbauwhede, I.6
-
25
-
-
84875762817
-
Provably secure and practical identification schemes and corresponding signature schemes. In: Advances in Cryptology (CRYPTO’92)
-
Okamoto T (1993) Provably secure and practical identification schemes and corresponding signature schemes. In: Advances in Cryptology (CRYPTO’92), pp 31–53
-
(1993)
pp 31–53
-
-
Okamoto, T.1
-
26
-
-
49049105964
-
EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. In: IEEE international conference on RFID
-
Lee YK, Batina L, Verbauwhede I (2008) EC-RAC (ECDLP based randomized access control): provably secure RFID authentication protocol. In: IEEE international conference on RFID, pp 97–104
-
(2008)
pp 97–104
-
-
Lee, Y.K.1
Batina, L.2
Verbauwhede, I.3
-
27
-
-
75649122972
-
Low-cost digital signature architecture suitable for radio frequency identification tags
-
O’Neill M, Robshaw MJ (2010) Low-cost digital signature architecture suitable for radio frequency identification tags. Comput Digital Tech IET 4(1):14–26
-
(2010)
Comput Digital Tech IET
, vol.4
, Issue.1
, pp. 14-26
-
-
O’Neill, M.1
Robshaw, M.J.2
-
28
-
-
77957684720
-
Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems-performance analysis by simulations. In: IEEE international conference on wireless communications, networking and information security (WCNIS)
-
Godor G, Giczi N, Imre S (2010) Elliptic curve cryptography based mutual authentication protocol for low computational capacity RFID systems-performance analysis by simulations. In: IEEE international conference on wireless communications, networking and information security (WCNIS), pp 650–657
-
(2010)
pp 650–657
-
-
Godor, G.1
Giczi, N.2
Imre, S.3
-
29
-
-
79955735535
-
Vulnerability of two multiple-key agreement protocols
-
Farash MS, Bayat M, Attari MA (2011) Vulnerability of two multiple-key agreement protocols. Comput Electr Eng 37(2):199–204
-
(2011)
Comput Electr Eng
, vol.37
, Issue.2
, pp. 199-204
-
-
Farash, M.S.1
Bayat, M.2
Attari, M.A.3
-
30
-
-
84899624931
-
A certificateless multiple-key agreement protocol without one-way hash functions based on bilinear pairings
-
Farash MS, Attari MA, Bayat M (2012) A certificateless multiple-key agreement protocol without one-way hash functions based on bilinear pairings. IACSIT Int J Eng Technol 4(3):321–325
-
(2012)
IACSIT Int J Eng Technol
, vol.4
, Issue.3
, pp. 321-325
-
-
Farash, M.S.1
Attari, M.A.2
Bayat, M.3
-
31
-
-
84876280558
-
A new efficient authenticated multiple-key exchange protocol from bilinear pairings
-
Farash MS, Attari MA, Atani RE, Jami M (2013) A new efficient authenticated multiple-key exchange protocol from bilinear pairings. Comput Electr Eng 39(2):530–541
-
(2013)
Comput Electr Eng
, vol.39
, Issue.2
, pp. 530-541
-
-
Farash, M.S.1
Attari, M.A.2
Atani, R.E.3
Jami, M.4
-
32
-
-
84902245219
-
Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
-
Farash MS, Attari MA (2013) Provably secure and efficient identity-based key agreement protocol for independent PKGs using ECC. ISC Int J Inf Secur 5(1):1–15
-
(2013)
ISC Int J Inf Secur
, vol.5
, Issue.1
, pp. 1-15
-
-
Farash, M.S.1
Attari, M.A.2
-
33
-
-
84893678218
-
A pairing-free ID-based key agreement protocol with different PKGs
-
Farash MS, Attari MA (2014) A pairing-free ID-based key agreement protocol with different PKGs. Int J Netw Secur 16(2):143–148
-
(2014)
Int J Netw Secur
, vol.16
, Issue.2
, pp. 143-148
-
-
Farash, M.S.1
Attari, M.A.2
-
34
-
-
84902778355
-
An enhanced and secure three-party password-based authenticated key exchange protocol without using server’s public-keys and symmetric cryptosystems
-
Farash MS, Attari MA (2014) An enhanced and secure three-party password-based authenticated key exchange protocol without using server’s public-keys and symmetric cryptosystems. Inf Technol Control 43(2):143–150
-
(2014)
Inf Technol Control
, vol.43
, Issue.2
, pp. 143-150
-
-
Farash, M.S.1
Attari, M.A.2
-
35
-
-
84903725812
-
Privacy and authentication protocol for mobile RFID systems. Wirel Pers Commun
-
Niu B, Zhu X, Chi H, Li H (2014) Privacy and authentication protocol for mobile RFID systems. Wirel Pers Commun. doi:10.1007/s11277-014-1605-6
-
(2014)
doi:10.1007/s11277-014-1605-6
-
-
Niu, B.1
Zhu, X.2
Chi, H.3
Li, H.4
|