An authentication protocol in a security layer for RFID smart tags

被引:0
作者
Feldhofer, Martin [1 ]
机构
[1] Inst. Appl. Info. Proc. and Commun., Graz University of Technology, Inffeldgasse 16a, 8010 Graz, Austria
来源
Proc Mediterr Electrotech Conf MELECON | 1600年 / 759-762期
关键词
Compendex;
D O I
Proceedings of the 12th IEEE Mediterranean Electrotechnical Conference, MELECON 2004
中图分类号
学科分类号
摘要
Cryptography - Embedded systems - Internet - Java programming language - Microcontrollers - Network protocols - Problem solving - Security systems
引用
收藏
相关论文
共 50 条
[41]   Application-binding protocol in the user centric smart card ownership model [J].
Information Security Group Smart Card Centre, Royal Holloway, University of London, Egham, Surrey, United Kingdom .
Lect. Notes Comput. Sci., (208-225)
[42]   Security Analysis and Optimization of TLS1.3 Protocol Based on HCPN Model [J].
Xie, Pengshou ;
Li, Wei ;
Kang, Yongping ;
Feng, Tao ;
Zhu, Jiafeng ;
Yang, Xinghui .
International Journal of Network Security, 2024, 26 (04) :622-634
[43]   A security-enhanced scheme for MQTT protocol based on domestic cryptographic algorithm [J].
Liu, Zechao ;
Liang, Tao ;
Lyu, Jiazhuo ;
Lang, Dapeng .
Computer Communications, 2024, 221 :1-9
[44]   Security Analysis of TBPKI-2 Protocol Based on Minimal Element Theory [J].
Zong, Wen-Bei ;
Yu, Lei .
International Journal of Network Security, 2022, 24 (06) :1081-1088
[45]   A performance of security aspect in WiMAX physical layer with different modulation schemes [J].
Jha, Rakesh Kumar ;
Limkarl, Suresh ;
Dalal, Upena D. .
Communications in Computer and Information Science, 2011, 125 CCIS :433-440
[46]   RIFL: A reliable link layer network protocol for data center communication [J].
Shen Q. ;
Zheng J. ;
Chow P. .
Journal of Optical Communications and Networking, 2022, 14 (03) :111-126
[47]   Evaluating the Performance of Cooperative NOMA with Energy Harvesting Under Physical Layer Security [J].
Le, Thi Anh ;
Kong, Hyung Yun .
Wireless Personal Communications, 2019, 108 (02) :1037-1054
[48]   Physical Layer Security in Satellite Communication: State-of-the-art and Open Problems [J].
College of Science and Engineering, Hamad Bin Khalifa University, Education City, Doha, Qatar .
arXiv,
[49]   Data Security Analysis of PHY Layer Using Artificial Intelligence and Machine Learning [J].
Pagidimalla, Panduraju ;
Venketbabu, T. ;
Kanimozhi, J.K. ;
Renuka, S. ;
Anuradha, Nandula ;
Surenderkumar, S. .
2023 9th International Conference on Advanced Computing and Communication Systems, ICACCS 2023, 2023, :2507-2515
[50]   Physical Layer Security Enhancement with Reconfigurable Intelligent Surface-Aided Networks [J].
Zhang, Jiayi ;
Du, Hongyang ;
Sun, Qiang ;
Ai, Bo ;
Ng, Derrick Wing Kwan .
IEEE Transactions on Information Forensics and Security, 2021, 16 :3480-3495