Design and analysis of cryptographic protocols for RFID

被引:0
|
作者
State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100080, China [1 ]
机构
来源
Jisuanji Xuebao | 2006年 / 4卷 / 581-589期
关键词
28;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] Design of Symmetric-Key Primitives for Advanced Cryptographic Protocols
    Aly, Abdelrahaman
    Ashur, Tomer
    Ben-Sasson, Eli
    Dhooghe, Siemen
    Szepieniec, Alan
    IACR TRANSACTIONS ON SYMMETRIC CRYPTOLOGY, 2020, 2020 (03) : 1 - 45
  • [32] Cryptography and cryptographic protocols
    Goldreich, O
    DISTRIBUTED COMPUTING, 2003, 16 (2-3) : 177 - 199
  • [33] Theoretical Analysis of RFID Security Protocols
    Zavvari, A.
    Islam, M. T.
    Shakiba, M.
    Mandeep, S. J.
    2014 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2014, : 302 - 306
  • [34] Programming cryptographic protocols
    Guttman, JD
    Herzog, JC
    Ramsdell, JD
    Sniffen, BT
    TRUSTWORTHY GLOBAL COMPUTING, 2005, 3705 : 116 - 145
  • [35] A Critical Analysis of RFID Security Protocols
    Sharif, Atif
    Potdar, Vidyasagar
    2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1357 - 1362
  • [36] Cryptography and cryptographic protocols
    Oded Goldreich
    Distributed Computing, 2003, 16 : 177 - 199
  • [37] A formal analysis for capturing replay attacks in cryptographic protocols
    Gao, Han
    Bodei, Chiara
    Degano, Pierpaolo
    Nielson, Hanne Riis
    ADVANCES IN COMPUTER SCIENCE - ASIAN 2007: COMPUTER AND NETWORK SECURITY, PROCEEDINGS, 2007, 4846 : 150 - +
  • [38] Process algebraic frameworks for the specification and analysis of cryptographic protocols
    Gorrieri, R
    Martinelli, F
    MATHEMATICAL FOUNDATIONS OF COMPUTER SCIENCE 2003, PROCEEDINGS, 2003, 2747 : 46 - 67
  • [39] Adversarial Security Analysis of Cryptographic Protocols for IoD Networks
    Samanth, Snehal
    Prema, K. V.
    Balachandra, Mamatha
    IEEE ACCESS, 2024, 12 : 183792 - 183808
  • [40] Decision procedures for the analysis of cryptographic protocols by logics of belief
    Monniaux, D
    PROCEEDINGS OF THE 12TH IEEE COMPUTER SECURITY FOUNDATIONS WORKSHOP, 1999, : 44 - 54