An authentication protocol in a security layer for RFID smart tags

被引:0
作者
Feldhofer, Martin [1 ]
机构
[1] Inst. Appl. Info. Proc. and Commun., Graz University of Technology, Inffeldgasse 16a, 8010 Graz, Austria
来源
Proc Mediterr Electrotech Conf MELECON | 1600年 / 759-762期
关键词
Compendex;
D O I
Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference, MELECON 2004
中图分类号
学科分类号
摘要
Cryptography - Embedded systems - Internet - Java programming language - Microcontrollers - Network protocols - Problem solving - Security systems
引用
收藏
相关论文
共 50 条
  • [31] Intelligent Network Security with Session Initiation Protocol and Web Services
    Handoura, Abdallah
    Bourget, Daniel
    [J]. International Journal of Network Security, 2024, 26 (04) : 582 - 588
  • [32] A robust authentication protocol for multi-server architecture using elliptic curve cryptography
    Zhang, Xueqin
    Wang, Baoping
    Zhang, Wenpeng
    [J]. International Journal of Network Security, 2019, 21 (02) : 191 - 198
  • [33] ISO PRESENTATION LAYER 6 PROTOCOL ISSUES.
    Heafner, John F.
    Wood, Helen M.
    [J]. Conference Record - International Conference on Communications, 1980, 1 : 1 - 5
  • [34] A New Scheme of BACnet Protocol Based on HCPN Security Evaluation Method
    Feng, Tao
    Jiang, Xiao-yan
    Fang, Jun-li
    Gong, Xiang
    [J]. International Journal of Network Security, 2022, 24 (06) : 1064 - 1075
  • [35] Multi-Tier Model with JSON-RPC in Telemedicine Devices Authentication and Authorization Protocol
    Setianto
    Dwi, Y.B.
    Wahyuningrum
    Estri, Shinta
    [J]. 2021 7th International Conference on Engineering, Applied Sciences and Technology, ICEAST 2021 - Proceedings, 2021, : 213 - 216
  • [36] An Improvement of A Robust Authentication Protocol for Multi-server Architecture Using Elliptic Curve Cryptography
    Hwang, Min-Shiang
    Li, Hou-Wen
    Yang, Cheng-Ying
    [J]. International Journal of Network Security, 2024, 26 (04) : 713 - 718
  • [37] Automated Security Verification for Crypto Protocol Implementations: Verifying the Jessie Project
    Computing Department, Open University, United Kingdom
    [J]. Electron. Notes Theor. Comput. Sci., 1 (123-136):
  • [38] Destination assisted cooperative jamming for wireless physical layer security
    Department of Electrical and Computer Engineering, Rutgers-The State University of New Jersey, New Brunswick, NJ 08854, United States
    [J]. WIFS - Proc. IEEE Int. Workshop Inf. Forensics Secur., (282-287):
  • [39] Wireless-powered friendly jammer for physical layer security
    Research School of Engineering, Australian National University, Canberra, Australia
    [J]. Int. Conf. Wirel. Commun. Signal Process., WCSP, 2015,
  • [40] A hierarchical structure based reader anti-collision protocol for dense RFID reader networks
    Department of Electrical Engineering, KAIST, Daejeon, Korea, Republic of
    [J]. Int. Conf. Adv. Commun. Technol. ICACT, (164-167):