搜索结果: 1-15 共查到“密码学 RFID authentication protocol”相关记录22条 . 查询时间(0.125 秒)
Security Analysis of Fan et al. Lightweight RFID Authentication Protocol for Privacy Protection in IoT
RFID IoT Secret disclosure
2018/5/2
The designers of Radio-Frequency IDentification (RFID) systems have a challenging task for proposing secure mutual authentication protocols for Internet of Things (IoT) applications. Recently, Fan et ...
On the security of another CRC based ultralightweight RFID authentication protocol
RFID EPC-C1G2 Cyclic Redundancy Code
2017/11/1
Design of ultra-lightweight authentication protocols for RFID systems conformed with the EPC Class-1 Generation-2 standard is still a challenging issue in RFID security. Recently, Maurya et al. have p...
Security Analysis of an Ultra-lightweight RFID Authentication Protocol for M-commerce
Mobile commerce RFID Ultra-lightweight
2017/6/9
Over the last few years, more people perform their social activities on mobile devices, such as mobile payment or mobile wallet. Mobile commerce (m-commerce) refers to manipulating electronic commerce...
Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse
Hardware Trojan Horse LCMQ Safe Error
2016/12/26
Radio-Frequency Identification tags are used for several applications requiring authentication mechanisms, which if subverted can lead to dire consequences. Many of these devices are based on low-cost...
Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol
cryptanalysis identification protocol RFID security
2016/1/5
As low-cost RFID tags become more and more ubiquitous, it is necessary to design ultralightweight RFID
authentication protocols to prevent possible attacks and threats. We reevaluate Ahmadian et al.’...
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards
Security and Privacy RFID Authentication protocols
2015/12/22
In the past few years, the design of RFID authentication protocols in accordance with the EPC Class-1
Generation-2 (EPC C1 G2) standards, has been one of the most important challenges in the informat...
Weaknesses in a Recently Proposed RFID Authentication Protocol
RFID Authentication Security, Privacy
2014/3/5
Many RFID authentication protocols have been proposed to provide desired security and privacy level for RFID systems. Almost all of these protocols are based symmetric cryptography because of the limi...
Security Analysis of a PUF based RFID Authentication Protocol
Authentication PUF Traceability Attack Reader Impersonation Attack
2012/6/14
In this paper we consider the security of a PUF based RFID Authentication protocol which has been recently proposed by Bassil et al. The designers have claimed that their protocol offers immunity agai...
Security Analysis of a PUF based RFID Authentication Protocol
cryptographic protocols / RFID Authentication PUF Traceability Attack Reader Impersonation Attack Tag impersonation Attack, Desynchronization Attack
2012/3/20
In this paper we consider the security of a PUF based RFID Authentication protocol which has been recently proposed by Bassil et al. The designers have claimed that their protocol offers immunity agai...
An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer
RFID Privacy Security Ownership Transfer Protocol
2012/6/14
Radio Frequency IDentification based systems, which are the most famous example of ubiquitous networks, are getting pervasively deployed in many daily life applications where privacy sensitivity is en...
An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer
RFID Privacy Security Ownership Transfer Protocol
2012/3/20
Radio Frequency IDentification based systems, which are the most famous example of ubiquitous networks, are getting pervasively deployed in many daily life applications where privacy sensitivity is en...
Security Analysis of a PUF based RFID Authentication Protocol
PUF Traceability Attack Reader Impersonation Attack Tag impersonation Attack
2012/8/28
In this paper we consider the security of a PUF based RFID Authentication protocol which has been recently proposed by Bassil et al. The designers have claimed that their protocol offers immunity agai...
An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer
RFID Privacy Security Ownership Transfer Protocol
2012/8/28
Radio Frequency IDentification based systems, which are the most famous example of ubiquitous networks, are getting pervasively deployed in many daily life applications where privacy sensitivity is en...
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
cryptographi protocols/ RFID EPC-C1 G2 Mutual Authentication Secret Disclosure Tag Impersonation.
2012/3/27
In this paper, we analyze the security of AZUMI protocol which is compliant with the EPC-Class-1 Generation-2 standard and recently has been proposed by Peris \textit{et al.} This protocol is an impro...
A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem
RFID identification protocol privacy
2011/7/25
Recently, many researchers have proposed RFID authentication protocols. These protocols are mainly consists of two types: symmetric key based and asymmetric key based.