[go: up one dir, main page]

Wang et al., 2025 - Google Patents

A novel RFID authentication protocol based on a block-order-modulus variable matrix encryption algorithm

Wang et al., 2025

View PDF
Document ID
3112605505926331343
Author
Wang Y
Liu R
Gao T
Shu F
Lei X
Wu Y
Gui G
Wang J
Publication year
Publication venue
IEEE Transactions on Information Forensics and Security

External Links

Snippet

In this paper, authentication for mobile radio frequency identification (RFID) systems with low- cost tags is investigated. To this end, an adaptive modulus (AM) encryption algorithm is first proposed. To further enhance security without requiring additional storage for new key …
Continue reading at arxiv.org (PDF) (other versions)

Similar Documents

Publication Publication Date Title
Alladi et al. SecAuthUAV: A novel authentication scheme for UAV-ground station and UAV-UAV communication
Dinarvand et al. An efficient and secure RFID authentication protocol using elliptic curve cryptography
Cho et al. Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol
Liao et al. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
Chen et al. ECC-based untraceable authentication for large-scale active-tag RFID systems
Liu et al. Grouping-proofs-based authentication protocol for distributed RFID systems
Kumar et al. A comprehensive taxonomy of security and privacy issues in RFID
Jung et al. HRP: A HMAC-based RFID mutual authentication protocol using PUF
Niu et al. Privacy and authentication protocol for mobile RFID systems
Engels et al. Ultra-lightweight cryptography for low-cost RFID tags: Hummingbird algorithm and protocol
Wang et al. A novel RFID authentication protocol based on a block-order-modulus variable matrix encryption algorithm
CN107171811A (en) A kind of lightweight RFID safety authentication based on Present algorithms
Chen et al. A secure ownership transfer protocol using EPCglobal Gen-2 RFID
Safkhani et al. Implementation of secret disclosure attack against two IoT lightweight authentication protocols.
Alagheband et al. Unified privacy analysis of new‐found RFID authentication protocols
Hsu et al. Efficient identity authentication and encryption technique for high throughput RFID system
Xu et al. Efficient mobile RFID authentication protocol for smart logistics targets tracking
Mohsin et al. Exploring the RFID mutual authentication domain
Wei et al. Tripartite Authentication Protocol RFID/NFC Based on ECC.
CN107040363A (en) Lightweight RFID ownership transfer method and system based on chaos encryption
Saran et al. An improvised algorithm for a dynamic key generation model
Bu et al. Every step you take, i’ll be watching you: Practical stepauth-entication of RFID paths
Asadpour et al. Scalable, privacy preserving radio‐frequency identification protocol for the internet of things
Huang et al. An ultralightweight mutual authentication protocol for EPC C1G2 RFID tags
Habibi et al. Attacks on recent RFID authentication protocols