Wang et al., 2025 - Google Patents
A novel RFID authentication protocol based on a block-order-modulus variable matrix encryption algorithmWang et al., 2025
View PDF- Document ID
- 3112605505926331343
- Author
- Wang Y
- Liu R
- Gao T
- Shu F
- Lei X
- Wu Y
- Gui G
- Wang J
- Publication year
- Publication venue
- IEEE Transactions on Information Forensics and Security
External Links
Snippet
In this paper, authentication for mobile radio frequency identification (RFID) systems with low- cost tags is investigated. To this end, an adaptive modulus (AM) encryption algorithm is first proposed. To further enhance security without requiring additional storage for new key …
- 239000011159 matrix material 0 title abstract description 73
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Alladi et al. | SecAuthUAV: A novel authentication scheme for UAV-ground station and UAV-UAV communication | |
Dinarvand et al. | An efficient and secure RFID authentication protocol using elliptic curve cryptography | |
Cho et al. | Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol | |
Liao et al. | A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol | |
Chen et al. | ECC-based untraceable authentication for large-scale active-tag RFID systems | |
Liu et al. | Grouping-proofs-based authentication protocol for distributed RFID systems | |
Kumar et al. | A comprehensive taxonomy of security and privacy issues in RFID | |
Jung et al. | HRP: A HMAC-based RFID mutual authentication protocol using PUF | |
Niu et al. | Privacy and authentication protocol for mobile RFID systems | |
Engels et al. | Ultra-lightweight cryptography for low-cost RFID tags: Hummingbird algorithm and protocol | |
Wang et al. | A novel RFID authentication protocol based on a block-order-modulus variable matrix encryption algorithm | |
CN107171811A (en) | A kind of lightweight RFID safety authentication based on Present algorithms | |
Chen et al. | A secure ownership transfer protocol using EPCglobal Gen-2 RFID | |
Safkhani et al. | Implementation of secret disclosure attack against two IoT lightweight authentication protocols. | |
Alagheband et al. | Unified privacy analysis of new‐found RFID authentication protocols | |
Hsu et al. | Efficient identity authentication and encryption technique for high throughput RFID system | |
Xu et al. | Efficient mobile RFID authentication protocol for smart logistics targets tracking | |
Mohsin et al. | Exploring the RFID mutual authentication domain | |
Wei et al. | Tripartite Authentication Protocol RFID/NFC Based on ECC. | |
CN107040363A (en) | Lightweight RFID ownership transfer method and system based on chaos encryption | |
Saran et al. | An improvised algorithm for a dynamic key generation model | |
Bu et al. | Every step you take, i’ll be watching you: Practical stepauth-entication of RFID paths | |
Asadpour et al. | Scalable, privacy preserving radio‐frequency identification protocol for the internet of things | |
Huang et al. | An ultralightweight mutual authentication protocol for EPC C1G2 RFID tags | |
Habibi et al. | Attacks on recent RFID authentication protocols |