Addressing Flaws in RFID Authentication Protocols
From MaRDI portal
Publication:3104736
DOI10.1007/978-3-642-25578-6_17zbMath1291.94187OpenAlexW185046124MaRDI QIDQ3104736
Di Ma, Mohammad Reza Aref, Mohammad Habibi
Publication date: 16 December 2011
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/978-3-642-25578-6_17
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Cites Work
- Vulnerability analysis of RFID protocols for tag ownership transfer
- Traceable Privacy of Recent Provably-Secure RFID Protocols
- A New Formal Proof Model for RFID Location Privacy
- A New Framework for RFID Privacy
- Passive Attacks on a Class of Authentication Protocols for RFID
- On Privacy Models for RFID
- Reducing Time Complexity in RFID Systems
- Financial Cryptography and Data Security
This page was built for publication: Addressing Flaws in RFID Authentication Protocols