Security analysis of an RFID protocol based on insubvertible encryption

被引:0
|
作者
Wei, Yongzhuang [1 ,2 ]
Ouyang, Ning [1 ]
Ma, Chunbo [1 ]
机构
[1] School of Information and Communication, Guilin University of Electronic Technology, Guilin 541004, China
[2] State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
关键词
11;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:958 / 961
相关论文
共 50 条
  • [41] An Improvement RFID Security Authentication Protocol Based on Hash Function
    Sun, Haowen
    Li, Peng
    Xu, He
    Zhu, Feng
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 375 - 384
  • [42] Mutual Authentication Security RFID Protocol Based on Time Stamp
    Zhang, Changlun
    Zhang, Wenqi
    Mu, Haibing
    2015 FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE THEORY, SYSTEMS AND APPLICATIONS (CCITSA 2015), 2015, : 166 - 170
  • [43] Anti-Collision and Security Protocol of Logistics Warehouse Labels by Integrating RFID and Chaotic Encryption Algorithm
    Gu Y.
    Xia F.
    Wang W.
    Yang S.
    Ye Y.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [44] Optimization design of encryption protocol in network security protocol based on wireless network development
    Zhang, Ming
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (05) : 6099 - 6106
  • [45] Security of an RFID Protocol for Supply Chains
    van Deursen, Ton
    Radomirovic, Sasa
    PROCEEDINGS OF THE ICEBE 2008: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, 2008, : 568 - 573
  • [46] A lightweight security authentication protocol for RFID
    Guosheng Zhao
    Hongqi Bao
    Jian Wang
    Peer-to-Peer Networking and Applications, 2025, 18 (3)
  • [47] Multilevel Security Protocol using RFID
    Faiazuddin, Syed
    Rao, S. Venkat
    Rao, S. C. V. Ramana
    Rao, M. V. Sainatha
    Kumar, P. Sathish
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2011, 2 (02) : 129 - 133
  • [48] A Security Protocol Designed with Proxy for RFID
    Zhou Jun
    Xu Yong-jun
    Li Xiao-wei
    2012 WORLD AUTOMATION CONGRESS (WAC), 2012,
  • [49] Security analysis of RFID based on multiple readers
    Ma, Jia-lin
    Wei, Xu
    Liu, Jie
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 265 - 268
  • [50] Security Analysis of RFID based on Multiple Readers
    Jin, Bo
    Jin, Hongyu
    CEIS 2011, 2011, 15