Secure and efficient RFID mutual authentication protocol
From MaRDI portal
Publication:3406963
Recommendations
- Consideration on the brute-force attack cost and retrieval cost: a hash-based radio-frequency identification (RFID) tag mutual authentication protocol
- Fast privacy preserving RFID authentication protocol
- Two mutual authentication protocols based on zero-knowledge proofs for RFID systems
- A lightweight RFID security authentication protocol based on hash function and arrangement
- Mutual-authentication scheme based on hash function and elliptic curve cryptography
Cited in
(20)- Comparison of RFID protocols on harmful points that threaten the security and privacy of RFID structures
- A novel mutual authentication scheme based on quadratic residues for RFID systems
- Cryptographic Hardware and Embedded Systems - CHES 2004
- Cloud-based lightweight secure RFID mutual authentication protocol in IoT
- Hierarchical ECC-based RFID authentication protocol
- Efficient tag path authentication protocol with less tag memory
- Fast privacy preserving RFID authentication protocol
- An efficient RFID anonymous batch authentication protocol based on group signature
- RFID communication security protocol based on NTRU public key cryptosystem
- RHDP-scheme for RFID's efficiency improvement on the ubiquitous computing
- Cloud-based RFID mutual authentication scheme for efficient privacy preserving in IoV
- An automatic, time-based, secure pairing protocol for passive RFID
- Mobile RFID security protocol and its GNY logic analysis
- Mutual-authentication scheme based on hash function and elliptic curve cryptography
- Efficient RFID authentication protocols based on pseudorandom sequence generators
- Consideration on the brute-force attack cost and retrieval cost: a hash-based radio-frequency identification (RFID) tag mutual authentication protocol
- RFID authentication efficient proactive information security within computational security
- Two mutual authentication protocols based on zero-knowledge proofs for RFID systems
- A Highly Scalable RFID Authentication Protocol
- Authentication protocols for reliable information provision systems with low computational-ability devices
This page was built for publication: Secure and efficient RFID mutual authentication protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q3406963)