A Secure ECC-Based RFID Authentication Scheme Using Hybrid Protocols

被引:0
|
作者
Liao, Yi-Pin [1 ]
Hsiao, Chih-Ming [1 ]
机构
[1] Liao, Yi-Pin
[2] Hsiao, Chih-Ming
来源
Liao, Y.-P. (newsun87@mail.sju.edu.tw) | 2013年 / Springer Science and Business Media Deutschland GmbH卷 / 21期
关键词
36;
D O I
10.1007/978-3-642-35473-1_1
中图分类号
学科分类号
摘要
引用
收藏
页码:1 / 13
相关论文
共 50 条
  • [1] Vulnerabilities of an ECC-based RFID authentication scheme
    Li, Nan
    Mu, Yi
    Susilo, Willy
    Guo, Fuchun
    Varadharajan, Vijay
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (17) : 3262 - 3270
  • [2] A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
    Liao, Yi-Pin
    Hsiao, Chih-Ming
    AD HOC NETWORKS, 2014, 18 : 133 - 146
  • [3] A secure ECC-based RFID mutual authentication protocol for internet of things
    Alamr, Amjad Ali
    Kausar, Firdous
    Kim, Jongsung
    Seo, Changho
    JOURNAL OF SUPERCOMPUTING, 2018, 74 (09): : 4281 - 4294
  • [4] A secure ECC-based RFID mutual authentication protocol for internet of things
    Amjad Ali Alamr
    Firdous Kausar
    Jongsung Kim
    Changho Seo
    The Journal of Supercomputing, 2018, 74 : 4281 - 4294
  • [5] ECC-Based RFID Authentication Protocol
    Yang X.-C.
    Xu C.-X.
    Li C.-R.
    Journal of Electronic Science and Technology, 2020, 18 (04) : 320 - 329
  • [6] ECC-Based RFID Authentication Protocol
    Xing-Chun Yang
    Chun-Xiang Xu
    Chao-Rong Li
    JournalofElectronicScienceandTechnology, 2020, 18 (04) : 320 - 329
  • [7] A secure ECC-based mobile RFID mutual authentication protocol and its application
    Chiou, Shin-Yan
    Ko, Wen-Tsai
    Lu, Erl-Huei
    International Journal of Network Security, 2018, 20 (02): : 396 - 402
  • [8] Hierarchical ECC-Based RFID Authentication Protocol
    Batina, Lejia
    Seys, Stefaan
    Singelee, Dave
    Verbanwhede, Ingrid
    RFID SECURITY AND PRIVACY, 2012, 7055 : 183 - 201
  • [9] A Novel ECC-based RFID Authentication Protocol
    Fang Mingwei
    Wu Junjun
    Zhang Xinfang
    Chen Hong
    ADVANCED MATERIALS AND COMPUTER SCIENCE, PTS 1-3, 2011, 474-476 : 1764 - +
  • [10] Hierarchical ECC-Based RFID Authentication Protocol
    Batina, Lejla
    Seys, Stefaan
    Singelee, Dave
    Verbauwhede, Ingrid
    RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 183 - 201