Desynchronization attacks on RFID security protocols

被引:0
|
作者
机构
[1] Deng, Miaolei
[2] Zhu, Weijun
来源
Deng, M. (dmlei2003@163.com) | 1600年 / Universitas Ahmad Dahlan卷 / 11期
关键词
21;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] Data desynchronization attacks on RFID security protocols
    Cao, Zheng
    Ma, Jianfeng
    Yang, Lin
    Deng, Miaolei
    Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2013, 41 (04): : 65 - 69
  • [2] Data Desynchronization Attacks on two Lightweight Security Protocols for the RFID System
    Deng, Miaolei
    Zhang, Haojun
    Zhu, Weijun
    INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2331 - +
  • [3] A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems
    Gao, Lijun
    Ma, Maode
    Shu, Yantai
    Wei, Yuhua
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 68 (04) : 1943 - 1959
  • [4] A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems
    Lijun Gao
    Maode Ma
    Yantai Shu
    Yuhua Wei
    Wireless Personal Communications, 2013, 68 : 1943 - 1959
  • [5] Algebraic Attacks on RFID Protocols
    van Deursen, Ton
    Radomirovic, Sasa
    INFORMATION SECURITY THEORY AND PRACTICE: SMART DEVICES, PERVASIVE SYSTEMS, AND UBIQUITOUS NETWORKS, PROCEEDINGS, 2009, 5746 : 38 - 51
  • [6] RFID Security Protocols
    Daou, Hoda
    Kayssi, Ayman
    Chehab, Ali
    IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 233 - 237
  • [7] Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols
    Süleyman Kardaş
    Ziya Alper Genç
    Wireless Personal Communications, 2018, 98 : 1135 - 1154
  • [8] Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols
    Kardas, Suleyman
    Genc, Ziya Alper
    WIRELESS PERSONAL COMMUNICATIONS, 2018, 98 (01) : 1135 - 1154
  • [9] Attacks on Recent RFID Authentication Protocols
    Mohammad Hassan Habibi
    Mohammad Reza Aref
    Journal of Signal Processing Systems, 2015, 79 : 271 - 283
  • [10] Attacks on and Countermeasures for Two RFID Protocols
    Chen, Xiuqing
    Cao, Tianjie
    Doss, Robin
    Zhai, Jingxuan
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5825 - 5848