Consideration on the brute-force attack cost and retrieval cost: a hash-based radio-frequency identification (RFID) tag mutual authentication protocol
From MaRDI portal
(Redirected from Publication:524675)
Recommendations
- Secure and efficient RFID mutual authentication protocol
- A lightweight RFID security authentication protocol based on hash function and arrangement
- Comparison of RFID protocols on harmful points that threaten the security and privacy of RFID structures
- Cryptanalysis of the Cho et al. protocol: a hash-based RFID tag mutual authentication protocol
- Minimalist cryptography for low-cost RFID tags (extended abstract)
Cited in
(12)- Survey of attacking and defending in the RFID system
- Comparison of RFID protocols on harmful points that threaten the security and privacy of RFID structures
- Vulnerability aware graphs for RFID protocol security benchmarking
- A framework for RFID survivability requirement analysis and specification
- Cryptanalysis of the Cho et al. protocol: a hash-based RFID tag mutual authentication protocol
- RFID communication security protocol based on NTRU public key cryptosystem
- Two mutual authentication protocols based on zero-knowledge proofs for RFID systems
- Multi-attribute counterfeiting tag identification protocol in large-scale RFID system
- Cloud-based lightweight secure RFID mutual authentication protocol in IoT
- Secure and efficient RFID mutual authentication protocol
- Minimalist cryptography for low-cost RFID tags (extended abstract)
- Mutual-authentication scheme based on hash function and elliptic curve cryptography
This page was built for publication: Consideration on the brute-force attack cost and retrieval cost: a hash-based radio-frequency identification (RFID) tag mutual authentication protocol
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q524675)