-
4
-
-
84919847449
-
Consideration on the Brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol
-
J.-S. Cho, Y.-S. Jeong, and S. Park Consideration on the Brute-force attack cost and retrieval cost: a hash-based radio-frequency identification (RFID) tag mutual authentication protocol Comput Math Appl 2012
-
(2012)
Comput Math Appl
-
-
Cho, J.-S.1
Jeong, Y.-S.2
Park, S.3
-
5
-
-
33847330246
-
A lightweight RFID protocol to protect against traceability and cloning attacks
-
T. Dimitriou A lightweight RFID protocol to protect against traceability and cloning attacks Proceedings of SecureComm'05 2005 59 66
-
(2005)
Proceedings of SecureComm'05
, pp. 59-66
-
-
Dimitriou, T.1
-
9
-
-
85027455461
-
Lightweight and energy efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks
-
P. Gope, and T. Hwang Lightweight and energy efficient mutual authentication and key agreement scheme with user anonymity for secure communication in global mobility networks IEEE Syst J 2015 10.1109/JSYST.2015.2416396
-
(2015)
IEEE Syst J
-
-
Gope, P.1
Hwang, T.2
-
10
-
-
84929945678
-
Enhanced secure mutual authentication, and key agreement scheme preserving user anonymity in global mobile networks
-
P. Gope, and T. Hwang Enhanced secure mutual authentication, and key agreement scheme preserving user anonymity in global mobile networks Wirel Personal Commun 2015 10.1007/s11277-015-2344-z
-
(2015)
Wirel Personal Commun
-
-
Gope, P.1
Hwang, T.2
-
11
-
-
84947023563
-
-
http://www.cisco.com/c/en/us/td/docs/solutions/Enterprise/Mobility/WiFiLBS-DG/wifich6.pdf.
-
-
-
-
12
-
-
84903610110
-
Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time secrets
-
T. Hwang, and P. Gope Provably secure mutual authentication and key exchange scheme for expeditious mobile communication through synchronously one-time secrets Wirel Personal Commun 77 1 2014 197 224
-
(2014)
Wirel Personal Commun
, vol.77
, Issue.1
, pp. 197-224
-
-
Hwang, T.1
Gope, P.2
-
13
-
-
33144457479
-
RFID security and privacy: A research survey
-
A. Juels RFID security and privacy: a research survey IEEE J Sel Areas Commun 24 2 2006 381 394 10.1109/JSAC.2005.861395
-
(2006)
IEEE J Sel Areas Commun
, vol.24
, Issue.2
, pp. 381-394
-
-
Juels, A.1
-
14
-
-
38149094945
-
A study on low-cost RFID system management with mutual authentication scheme in ubiquitous
-
Kang S.-Y., and I.-Y. Lee A study on low-cost RFID system management with mutual authentication scheme in ubiquitous Proceedings of APNOMS, 4773, LNCS 2007 492 502
-
(2007)
Proceedings of APNOMS, 4773, LNCS
, pp. 492-502
-
-
Kang, S.-Y.1
Lee, I.-Y.2
-
15
-
-
53749094694
-
Public key cryptography based privacy preserving multi-context RFID infrastructure
-
S.V. Kaya, E. Savaş, A. Levi, and Ö. Erçetin Public key cryptography based privacy preserving multi-context RFID infrastructure Ad Hoc Netw 7 2009 136 152
-
(2009)
Ad Hoc Netw
, vol.7
, pp. 136-152
-
-
Kaya, S.V.1
Savaş, E.2
Levi, A.3
Erçetin, Ö.4
-
16
-
-
84869783330
-
De-synchronization attack on hash-based RFID mutual authentication protocol
-
H. Kim De-synchronization attack on hash-based RFID mutual authentication protocol J Secur Eng 9 4 2012 357 366
-
(2012)
J Secur Eng
, vol.9
, Issue.4
, pp. 357-366
-
-
Kim, H.1
-
17
-
-
84968503742
-
Elliptic curve cryptosystems
-
N. Koblitz Elliptic curve cryptosystems Math Comput 48 1987 203 209
-
(1987)
Math Comput
, vol.48
, pp. 203-209
-
-
Koblitz, N.1
-
19
-
-
84899644274
-
A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
-
Liao Y.-P., and C. Hsiao A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol Ad Hoc Netw 18 2014 133 146
-
(2014)
Ad Hoc Netw
, vol.18
, pp. 133-146
-
-
Liao, Y.-P.1
Hsiao, C.2
-
22
-
-
55749110412
-
A minimalist mutual authentication protocol for RFID system and BAN logic analysis
-
C. Qingling, Z. Yiju, and W. Yonghua A minimalist mutual authentication protocol for RFID system and BAN logic analysis ISECS international colloquium on computing, communication, control, and management 2008 449 453
-
(2008)
ISECS International Colloquium on Computing, Communication, Control, and Management
, pp. 449-453
-
-
Qingling, C.1
Yiju, Z.2
Yonghua, W.3
-
23
-
-
84889098244
-
Cryptanalysis of the Cho et al protocol: A hash-based RFID tag mutual authentication protocol
-
Part B, 15
-
M. Safkhani, P. Peris-Lopez, J.C. Hernandez-Castro, and N. Bagheri Cryptanalysis of the Cho et al. protocol: a hash-based RFID tag mutual authentication protocol J Comput Appl Math 259 March 2014 571 577 Part B, 15
-
(2014)
J Comput Appl Math
, vol.259
, pp. 571-577
-
-
Safkhani, M.1
Peris-Lopez, P.2
Hernandez-Castro, J.C.3
Bagheri, N.4
-
24
-
-
85008055668
-
Secure and server-less RFID authentication and search protocols
-
Tan C.C., Sheng B., and Li Q. Secure and server-less RFID authentication and search protocols IEEE Trans Wirel Commun 7 4 April 2008 1400 1407
-
(2008)
IEEE Trans Wirel Commun
, vol.7
, Issue.4
, pp. 1400-1407
-
-
Tan, C.C.1
Sheng, B.2
Li, Q.3
-
26
-
-
79952396973
-
Security improvement in authentication protocol for Gen-2 based RFID system
-
Wang L., Yi X., C. Lv, and Guo Y. Security improvement in authentication protocol for Gen-2 based RFID system J Convergence Inform Technol AICIT 6 1 2011 157 169
-
(2011)
J Convergence Inform Technol AICIT
, vol.6
, Issue.1
, pp. 157-169
-
-
Wang, L.1
Yi, X.2
Lv, C.3
Guo, Y.4
-
27
-
-
33749379761
-
Mutual authentication protocol for low-cost RFID
-
Yang J., J. Park, H. Lee, Ren K., and K. Kim Mutual authentication protocol for low-cost RFID Proceedings of the workshop on RFID and lightweight cryptography 2005 17 24
-
(2005)
Proceedings of the Workshop on RFID and Lightweight Cryptography
, pp. 17-24
-
-
Yang, J.1
Park, J.2
Lee, H.3
Ren, K.4
Kim, K.5
|