Lee et al., 2008 - Google Patents
An improvement on RFID authentication protocol with privacy protectionLee et al., 2008
- Document ID
- 4931913542984842953
- Author
- Lee Y
- Hsieh Y
- You P
- Chen T
- Publication year
- Publication venue
- 2008 Third International Conference on Convergence and Hybrid Information Technology
External Links
Snippet
Due to the well-developed technology, the radio frequency identification (RFID) is widely used in all areas. For some applications, the RFID system simply worked as a memory card without security mechanism. However, in many applications, the RFID systems need security …
- 238000005516 engineering process 0 abstract description 6
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Liao et al. | A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol | |
Cho et al. | Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol | |
Cho et al. | Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value | |
CN106712962B (en) | Mobile RFID system two-way authentication method and system | |
Doss et al. | A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems | |
CN100559393C (en) | RFID tag and its reader, reading system and security authentication method | |
Jung et al. | HRP: A HMAC-based RFID mutual authentication protocol using PUF | |
Chen et al. | An ownership transfer scheme using mobile RFIDs | |
Lien et al. | Reading order independent grouping proof for RFID tags | |
Lee et al. | An improvement on RFID authentication protocol with privacy protection | |
Bassil et al. | A PUF-based ultra-lightweight mutual-authentication RFID protocol | |
Won et al. | Strong authentication protocol for secure RFID tag search without help of central database | |
Rahman et al. | Lightweight protocol for anonymity and mutual authentication in RFID systems | |
Chun et al. | RFID tag search protocol preserving privacy of mobile reader holders | |
Huang et al. | An ultralightweight mutual authentication protocol for EPC C1G2 RFID tags | |
Liu | An efficient RFID authentication protocol for low-cost tags | |
Sadighian et al. | Afmap: Anonymous forward-secure mutual authentication protocols for rfid systems | |
Cho et al. | Hash-based RFID tag mutual authentication scheme with retrieval efficiency | |
Kardaş et al. | Providing resistance against server information leakage in RFID systems | |
Lee et al. | Security enhancement of the authentication protocol for RFID systems | |
Changqing et al. | An enhanced security authentication protocol based on hash-lock for low-cost RFID | |
Yin et al. | Keep all mobile users′ whereabouts secure: A radio frequency identification protocol anti‐tracking in 5G | |
Meng et al. | A RFID security protocol based on hash chain and three-way handshake | |
Fan et al. | A lightweight privacy-preserving mutual authentication protocol for RFID systems | |
Jin et al. | Hash-based tag ownership transfer protocol against traceability |