Research on hash-based RFID security authentication protocol

被引:0
|
作者
Ding, Zhenhua [1 ,2 ]
Li, Jintao [1 ]
Feng, Bo [1 ,2 ]
机构
[1] Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China
[2] Graduate University, Chinese Academy of Sciences, Beijing 100049, China
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Radio waves - Authentication - Cost benefit analysis - Radio frequency identification (RFID)
引用
收藏
页码:583 / 592
相关论文
共 50 条
  • [21] A Security and Performance Evaluation of Hash-Based RFID Protocols
    Lim, Tong-Lee
    Li, Tieyan
    Li, Yingjiu
    INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 406 - +
  • [22] A scalable and provably secure hash-based RFID protocol
    Avoine, G
    Oechslin, P
    Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 110 - 114
  • [23] A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection
    Lim, Jihwan
    Oh, Heekuck
    Kim, Sangjin
    INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2008, 4991 : 278 - +
  • [24] An Enhanced ID-Updating Hash-Based RFID Authentication Protocol with Strong Privacy Protection
    Shen, Jian
    Tan, Haowen
    Zheng, Yuhui
    Ji, Sai
    Wang, Jin
    INTELLIGENT SYSTEMS AND APPLICATIONS (ICS 2014), 2015, 274 : 2070 - 2079
  • [25] Hash-based RFID security protocol using randomly key-changed identification procedure
    Zhai, Jia
    Park, Chang Mok
    Wang, Gi-Nam
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 296 - 305
  • [26] Secure Hash-Based Password Authentication Protocol Using Smartcards
    Jung, Hyunhee
    Kim, Hyun Sung
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2011, PT V, 2011, 6786 : 593 - 606
  • [27] A hash-based strong password authentication protocol with user anonymity
    Department of Electrical and Computer Engineering, North Dakota State University, 1411 Centennial Blvd, Fargo, ND 58105, United States
    Int. J. Netw. Secur., 2006, 3 (205-209):
  • [28] A New RFID Secure Authentication Protocol Based on Hash
    Li Hai-lin
    Xu Peng-fei
    PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 429 - 432
  • [29] SRFID: A hash-based security scheme for low cost RFID systems
    Khedr, Walid I.
    EGYPTIAN INFORMATICS JOURNAL, 2013, 14 (01) : 89 - 98
  • [30] Hash-Based Password Authentication Protocol Against Phishing and Pharming Attacks
    Kim, Iksu
    Cho, Yongyun
    JOURNAL OF INFORMATION SCIENCE AND ENGINEERING, 2015, 31 (01) : 343 - 355