[go: up one dir, main page]

Huang et al., 2014 - Google Patents

A privacy and authentication protocol for mobile RFID system

Huang et al., 2014

Document ID
1531892742100193265
Author
Huang H
Yu P
Liu K
Publication year
Publication venue
2014 IEEE International Symposium on Independent Computing (ISIC)

External Links

Snippet

Since information communication via radio transmission can be easily eavesdropped, therefore, many radio frequency identification (RFID) security mechanisms for location privacy protection have been proposed recently. However, most of previously proposed …
Continue reading at ieeexplore.ieee.org (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06KRECOGNITION OF DATA; PRESENTATION OF DATA; RECORD CARRIERS; HANDLING RECORD CARRIERS
    • G06K19/00Record carriers for use with machines and with at least a part designed to carry digital markings
    • G06K19/06Record carriers for use with machines and with at least a part designed to carry digital markings characterised by the kind of the digital marking, e.g. shape, nature, code
    • G06K19/067Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components
    • G06K19/07Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips
    • G06K19/0723Record carriers with conductive marks, printed circuits or semiconductor circuit elements, e.g. credit or identity cards also with resonating or responding marks without active components with integrated circuit chips the record carrier comprising an arrangement for non-contact communication, e.g. wireless communication circuits on transponder cards, non-contact smart cards or RFIDs
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Cho et al. Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol
Doss et al. A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems
Kardaş et al. Cryptanalysis of lightweight mutual authentication and ownership transfer for RFID systems
Khor et al. Security problems in an RFID system
TWI398153B (en) Certification methods, authentication systems and electronic tags
Mtita et al. Efficient serverless radio‐frequency identification mutual authentication and secure tag search protocols with untrusted readers
Cortese et al. Efficient and practical authentication of PUF-based RFID tags in supply chains
Alagheband et al. Unified privacy analysis of new‐found RFID authentication protocols
Xiao et al. Security Protocol for RFID System Conforming to EPC-C1G2 Standard.
Won et al. Strong authentication protocol for secure RFID tag search without help of central database
Habibi et al. Practical attacks on a RFID authentication protocol conforming to EPC C-1 G-2 standard
Huang et al. A privacy and authentication protocol for mobile RFID system
Chang et al. A secure RFID mutual authentication protocol conforming to EPC class 1 generation 2 standard
Sohrabi-Bonab et al. Traceability analysis of quadratic residue-based RFID authentication protocols
Morshed et al. Efficient mutual authentication protocol for radiofrequency identification systems
Cho et al. Hash-based RFID tag mutual authentication scheme with retrieval efficiency
Chang et al. A location-privacy-protected RFID authentication scheme
Wang et al. Scalable and resynchronisable radio frequency identification ownership transfer protocol based on a sliding window mechanism
Lee et al. RFID mutual authentication protocol with unclonable RFID-tags
Kang et al. Comments on an Improved RFID Security Protocol for ISO/IEC WD 29167‐6
Niu et al. An ultralightweight and privacy-preserving authentication protocol for mobile RFID systems
Özcanhan Analysis of a recent quadratic residue based authentication protocol for low-cost RFID tags
Maarof et al. Security analysis of low cost RFID systems
Jin et al. Lightweight RFID mutual authentication protocol against feasible problems
Wang et al. PGMAP: A privacy guaranteed mutual authentication protocol conforming to EPC class 1 gen 2 standards