Secure and efficient RFID mutual authentication protocol
From MaRDI portal
Publication:3406963
DOI10.3724/SP.J.1087.2008.02236zbMATH Open1180.94036OpenAlexW2000466648MaRDI QIDQ3406963FDOQ3406963
Authors: Chang-she Ma, Tao Wang, Li-bin Wang
Publication date: 20 February 2010
Published in: Journal of Computer Applications (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.3724/sp.j.1087.2008.02236
Recommendations
- Consideration on the brute-force attack cost and retrieval cost: a hash-based radio-frequency identification (RFID) tag mutual authentication protocol
- Fast privacy preserving RFID authentication protocol
- Two mutual authentication protocols based on zero-knowledge proofs for RFID systems
- A lightweight RFID security authentication protocol based on hash function and arrangement
- Mutual-authentication scheme based on hash function and elliptic curve cryptography
Detection theory in information and communication theory (94A13) Network design and communication in computer systems (68M10) Network protocols (68M12)
Cited In (20)
- An efficient RFID anonymous batch authentication protocol based on group signature
- Comparison of RFID protocols on harmful points that threaten the security and privacy of RFID structures
- A Highly Scalable RFID Authentication Protocol
- Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV
- Efficient tag path authentication protocol with less tag memory
- Cryptographic Hardware and Embedded Systems - CHES 2004
- An automatic, time-based, secure pairing protocol for passive RFID
- RFID communication security protocol based on NTRU public key cryptosystem
- Two mutual authentication protocols based on zero-knowledge proofs for RFID systems
- Efficient RFID authentication protocols based on pseudorandom sequence generators
- RFID authentication efficient proactive information security within computational security
- Cloud-based lightweight secure RFID mutual authentication protocol in IoT
- Fast privacy preserving RFID authentication protocol
- Authentication protocols for reliable information provision systems with low computational-ability devices
- RHDP-scheme for RFID's efficiency improvement on the ubiquitous computing
- A novel mutual authentication scheme based on quadratic residues for RFID systems
- Hierarchical ECC-based RFID authentication protocol
- Mutual-authentication scheme based on hash function and elliptic curve cryptography
- Mobile RFID security protocol and its GNY logic analysis
- Consideration on the brute-force attack cost and retrieval cost: a hash-based radio-frequency identification (RFID) tag mutual authentication protocol
This page was built for publication: Secure and efficient RFID mutual authentication protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3406963)