Mohammadali et al., 2013 - Google Patents
Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standardMohammadali et al., 2013
View PDF- Document ID
- 16620243044062653968
- Author
- Mohammadali A
- Ahmadian Z
- Aref M
- Publication year
- Publication venue
- Cryptology ePrint Archive
External Links
Snippet
Abstract Radio Frequency IDentification (RFID) technology is a wireless identification method in which security and privacy are important parameters for public acceptance and widespread use. In order to thwart such security and privacy problems, a wide variety of …
- 210000001956 EPC 0 title abstract description 62
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cho et al. | Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol | |
EP2667326B1 (en) | Method for dynamic authentication between reader and tag, and device therefor | |
Bilal et al. | Security analysis of ultra-lightweight cryptographic protocol for low-cost RFID tags: Gossamer protocol | |
Chen et al. | An ownership transfer scheme using mobile RFIDs | |
CN102693438B (en) | Privacy protection radio frequency identification password protocol method and system | |
Mohammadali et al. | Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard | |
Bassil et al. | A PUF-based ultra-lightweight mutual-authentication RFID protocol | |
Akgün et al. | Attacks and improvements to chaotic map‐based RFID authentication protocol | |
Ha et al. | LRMAP: Lightweight and resynchronous mutual authentication protocol for RFID system | |
Ha et al. | Low-cost and strong-security RFID authentication protocol | |
Erguler et al. | Scalability and security conflict for RFID authentication protocols | |
Lim et al. | A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection | |
Habibi et al. | Practical attacks on a RFID authentication protocol conforming to EPC C-1 G-2 standard | |
Chang et al. | A secure RFID mutual authentication protocol conforming to EPC class 1 generation 2 standard | |
Huang et al. | An ultralightweight mutual authentication protocol for EPC C1G2 RFID tags | |
Safkhani et al. | Weaknesses in another Gen2-based RFID authentication protocol | |
Mohammadi et al. | Analysis and improvement of the lightweight mutual authentication protocol under EPC C-1 G-2 standard | |
Gurubani et al. | Improvements over extended LMAP+: RFID authentication protocol | |
Habibi et al. | Attacks on recent RFID authentication protocols | |
Kardaş et al. | Providing resistance against server information leakage in RFID systems | |
Taqieddin et al. | An enhanced EPC Gen2v2 RFID authentication and ownership management protocol | |
Habibi et al. | Security and privacy analysis of Song–Mitchell RFID authentication protocol | |
Huang et al. | A privacy and authentication protocol for mobile RFID system | |
Safkhani et al. | Cryptanalysis of improved Yeh et al.'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol. | |
Niu et al. | Security analysis of some recent authentication protocols for RFID |