Forward private RFID authentication protocol based on universal hash function

被引:0
|
作者
机构
[1] [1,Gao, Shujing
[2] Wang, Hongjun
来源
Gao, S. (shujing_g@126.com) | 1600年 / Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong卷 / 10期
关键词
Hash functions;
D O I
10.12733/jics20101934
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [31] A Desynchronization Tolerant RFID Private Authentication Protocol
    Yao, Qingsong
    Qi, Yong
    Chen, Ying
    Zhong, Xiao
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, 2010, 6221 : 120 - +
  • [32] Low-cost Authentication Protocol of RFID System Using One Block Hash Function
    Jin, Shi-mei
    You, Mo
    Li, Yong-zhen
    2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 671 - 676
  • [33] A Hash Based Mutual RFID Tag Authentication Protocol in Telecare Medicine Information System
    Keerti Srivastava
    Amit K. Awasthi
    Sonam D. Kaul
    R. C. Mittal
    Journal of Medical Systems, 2015, 39
  • [34] A Hash Based Mutual RFID Tag Authentication Protocol in Telecare Medicine Information System
    Srivastava, Keerti
    Awasthi, Amit K.
    Kaul, Sonam D.
    Mittal, R. C.
    JOURNAL OF MEDICAL SYSTEMS, 2015, 39 (01)
  • [35] Improve Healthcare Safety Using Hash-Based Authentication Protocol for RFID Systems
    Baashirah, Rania
    Abuzneid, Abdelshakour
    Tammineedi, Akhil
    Mathew, Maneesha
    Bandaru, Neelam
    Delair, Pulkit
    2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 800 - 805
  • [36] Research on Hash-Based low-cost RFID Security Authentication Protocol
    Huo Lin
    Jiang Yilin
    Hu Liangqing
    ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1524 - 1530
  • [37] An Almost-Optimal Forward-Private RFID Mutual Authentication Protocol with Tag Control
    D'Arco, Paolo
    INFORMATION SECURITY THEORY AND PRACTICE: SECURITY AND PRIVACY OF MOBILE DEVICES IN WIRELESS COMMUNICATION, 2011, 6633 : 69 - 84
  • [38] RFID Forward Secure Authentication Protocol: Flaw and Solution
    Yu, Kin Ying
    Yiu, S. M.
    Hui, C. K.
    CISIS: 2009 INTERNATIONAL CONFERENCE ON COMPLEX, INTELLIGENT AND SOFTWARE INTENSIVE SYSTEMS, VOLS 1 AND 2, 2009, : 627 - 632
  • [39] A Revised Serverless Authentication Protocol with Forward Security for RFID
    He Lei
    Gan Yong
    Li Na-na
    Zhang Tao
    APPLIED MECHANICS AND MECHANICAL ENGINEERING, PTS 1-3, 2010, 29-32 : 2267 - 2272
  • [40] The power of primes: security of authentication based on a universal hash-function family
    Alomair, Basel
    Clark, Andrew
    Poovendran, Radha
    JOURNAL OF MATHEMATICAL CRYPTOLOGY, 2010, 4 (02) : 121 - 148