An authentication protocol in a security layer for RFID smart tags

被引:0
作者
Feldhofer, Martin [1 ]
机构
[1] Inst. Appl. Info. Proc. and Commun., Graz University of Technology, Inffeldgasse 16a, 8010 Graz, Austria
来源
Proc Mediterr Electrotech Conf MELECON | 1600年 / 759-762期
关键词
Compendex;
D O I
Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference, MELECON 2004
中图分类号
学科分类号
摘要
Cryptography - Embedded systems - Internet - Java programming language - Microcontrollers - Network protocols - Problem solving - Security systems
引用
收藏
相关论文
共 50 条
  • [21] Mutual authentication protocol using hyperelliptic curve cryptosystem in constrained devices
    Chatterjee, K. (kakali2008@gmail.com), 1600, Femto Technique Co., Ltd. (15):
  • [22] A Novel Smart Lock Protocol Based on Group Signature
    Liu, Yonglei
    Hao, Kun
    Zhao, Jie
    Wang, Li
    Zhang, Weilong
    International Journal of Network Security, 2022, 24 (01) : 130 - 139
  • [23] A Compact Energy Harvesting RFID Tag for Smart Traffic Law Enforcement Systems
    Wickramasinghe S.
    Jayasinghe J.
    Mohammed G.N.A.
    Senadeera M.
    Kanagasabai M.
    Progress In Electromagnetics Research C, 2023, 135 : 181 - 193
  • [24] Security Analysis and Improvement of an Access Control Protocol for WBANs
    Rastegari, Parvin
    Khalili, Mojtaba
    Sakhaei, Ali
    International Journal of Network Security, 2023, 25 (02) : 285 - 296
  • [25] Take a Bite of the Reality Sandwich: Revisiting the Security of Progressive Message Authentication Codes
    Fraunhofer Fkie, Rwth Aachen University, Wachtberg, Germany
    不详
    WiSec - Proc. ACM Conf. Secur, Priv. in Wirel. Mob. Networks, 2022, (207-221):
  • [26] Efficient passive full-disclosure attack on RFID lightweight authentication protocols LMAP++ and SUAP
    Shao-hui, Wang
    Sujuan, Liu
    Danwei, Chen
    Telkomnika, 2012, 10 (06): : 1458 - 1464
  • [27] Temporally aware behaviour-based security in smart cards
    Smart Card Centre, University of London, Royal Holloway, TW20 OEX, United Kingdom
    1600, 604-608 (2006):
  • [28] Log Security Protection Model Incorporating Blockchain Smart Contracts
    Liu, Yifan
    Wan, Jianxiong
    Gao, Haoyu
    Yang, Yanyan
    Computer Engineering and Applications, 2023, 59 (12) : 242 - 257
  • [29] Enhancing the Security for Smart Card-Based Embedded Systems
    Kalyana Abenanth, G.
    Harish, K.
    Sachin, V.
    Rushyendra, A.
    Mohankumar, N.
    Lecture Notes on Data Engineering and Communications Technologies, 2022, 75 : 673 - 686
  • [30] Two-Factor Authentication and Key Agreement Schemes for Smart Home Fingerprint Characteristics
    Liu, Zhenpeng
    Li, Zeyuan
    Zhang, Qingwen
    Dong, Shuhui
    Liu, Jiahang
    Zhao, Yonggang
    Mobile Information Systems, 2022, 2022