Huang et al., 2014 - Google Patents
A privacy and authentication protocol for mobile RFID systemHuang et al., 2014
- Document ID
- 1531892742100193265
- Author
- Huang H
- Yu P
- Liu K
- Publication year
- Publication venue
- 2014 IEEE International Symposium on Independent Computing (ISIC)
External Links
Snippet
Since information communication via radio transmission can be easily eavesdropped, therefore, many radio frequency identification (RFID) security mechanisms for location privacy protection have been proposed recently. However, most of previously proposed …
- 210000001956 EPC 0 abstract description 11
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06K—RECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
- G06K19/00—Record carriers for use with machines and with at least a part designed to carry digital markings
- G06K19/06—Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
- G06K19/067—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
- G06K19/07—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
- G06K19/0723—Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/30—Authentication, i.e. establishing the identity or authorisation of security principals
- G06F21/31—User authentication
- G06F21/34—User authentication involving the use of external additional devices, e.g. dongles or smart cards
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cho et al. | Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol | |
Doss et al. | A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems | |
Kardaş et al. | Cryptanalysis of lightweight mutual authentication and ownership transfer for RFID systems | |
Khor et al. | Security problems in an RFID system | |
TWI398153B (en) | Certification methods, authentication systems and electronic tags | |
Mtita et al. | Efficient serverless radio‐frequency identification mutual authentication and secure tag search protocols with untrusted readers | |
Cortese et al. | Efficient and practical authentication of PUF-based RFID tags in supply chains | |
Alagheband et al. | Unified privacy analysis of new‐found RFID authentication protocols | |
Xiao et al. | Security Protocol for RFID System Conforming to EPC-C1G2 Standard. | |
Won et al. | Strong authentication protocol for secure RFID tag search without help of central database | |
Habibi et al. | Practical attacks on a RFID authentication protocol conforming to EPC C-1 G-2 standard | |
Huang et al. | A privacy and authentication protocol for mobile RFID system | |
Chang et al. | A secure RFID mutual authentication protocol conforming to EPC class 1 generation 2 standard | |
Sohrabi-Bonab et al. | Traceability analysis of quadratic residue-based RFID authentication protocols | |
Morshed et al. | Efficient mutual authentication protocol for radiofrequency identification systems | |
Cho et al. | Hash-based RFID tag mutual authentication scheme with retrieval efficiency | |
Chang et al. | A location-privacy-protected RFID authentication scheme | |
Wang et al. | Scalable and resynchronisable radio frequency identification ownership transfer protocol based on a sliding window mechanism | |
Lee et al. | RFID mutual authentication protocol with unclonable RFID-tags | |
Kang et al. | Comments on an Improved RFID Security Protocol for ISO/IEC WD 29167‐6 | |
Niu et al. | An ultralightweight and privacy-preserving authentication protocol for mobile RFID systems | |
Özcanhan | Analysis of a recent quadratic residue based authentication protocol for low-cost RFID tags | |
Maarof et al. | Security analysis of low cost RFID systems | |
Jin et al. | Lightweight RFID mutual authentication protocol against feasible problems | |
Wang et al. | PGMAP: A privacy guaranteed mutual authentication protocol conforming to EPC class 1 gen 2 standards |