An authentication protocol in a security layer for RFID smart tags

被引:0
|
作者
Feldhofer, Martin [1 ]
机构
[1] Inst. Appl. Info. Proc. and Commun., Graz University of Technology, Inffeldgasse 16a, 8010 Graz, Austria
来源
Proc Mediterr Electrotech Conf MELECON | 1600年 / 759-762期
关键词
Compendex;
D O I
Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference, MELECON 2004
中图分类号
学科分类号
摘要
Cryptography - Embedded systems - Internet - Java programming language - Microcontrollers - Network protocols - Problem solving - Security systems
引用
收藏
相关论文
共 50 条
  • [1] Improved RFID authentication protocol based on randomized McEliece cryptosystem
    Chikouche, Noureddine
    Cherif, Foudil
    Cayrel, Pierre-Louis
    Benmohammed, Mohamed
    International Journal of Network Security, 2015, 17 (04) : 413 - 422
  • [2] Lightweight anti-desynchronization RFID mutual authentication protocol
    Jia, Qingxuan
    Chen, Peng
    Gao, Xin
    Wei, Lingyun
    Wang, Xin
    Zhao, Bing
    Zhongnan Daxue Xuebao (Ziran Kexue Ban)/Journal of Central South University (Science and Technology), 2015, 46 (06): : 2149 - 2156
  • [3] Vulnerabilities in Chen and Dengs RFID mutual authentication and privacy protection protocol
    Information Systems and Operations Management, University of Florida, Gainesville, FL 32611-7169, United States
    不详
    Eng Appl Artif Intell, 7 (1300-1302):
  • [4] Mobile RFID Authentication Protocol Based on Parity Check Patching Operation
    Li, Zhen-Hui
    International Journal of Network Security, 2023, 25 (06) : 920 - 927
  • [5] A Security Authentication Protocol for Trusted Domains in an Autonomous Decentralized System
    Zhou, Ruikang
    Lai, Yingxu
    Liu, Zenghui
    Chen, Yinong
    Yao, Xiangzhen
    Gong, Jiezhong
    INTERNATIONAL JOURNAL OF DISTRIBUTED SENSOR NETWORKS, 2016,
  • [6] Security lightweight RFID protocol for U-healthcare system
    Chen, Xiuqing, 1600, Trade Science Inc, 126,Prasheel Park,Sanjay Raj Farm House,Nr. Saurashtra Unive, Rajkot, Gujarat, 360 005, India (10):
  • [7] Security weaknesses of dynamic ID-based remote user authentication protocol
    Lee, Hyoungseob
    Choi, Donghyun
    Lee, Yunho
    Won, Dongho
    Kim, Seungjoo
    World Academy of Science, Engineering and Technology, 2009, 35 : 190 - 193
  • [8] A quadratic residue-based lightweight RFID mutual authentication protocol with constant-time identification
    Zhou, Jingxian
    Journal of Communications, 2015, 10 (02): : 117 - 123
  • [9] "Unconventionally Shaped" Antenna Design for UHF RFID Tags
    Wang, Silong
    Liu, Yulong
    Ye, Terry Tao
    INTERNATIONAL JOURNAL OF ANTENNAS AND PROPAGATION, 2021, 2021
  • [10] Enhancing privacy of universal re-encryption scheme for RFID tags
    Saito, Junichiro
    Ryou, Jae-Cheol
    Sakurai, Kouichi
    Lect. Notes Comput. Sci., (879-890):