Research on hash-based RFID security authentication protocol

被引:0
|
作者
Ding, Zhenhua [1 ,2 ]
Li, Jintao [1 ]
Feng, Bo [1 ,2 ]
机构
[1] Institute of Computing Technology, Chinese Academy of Sciences, Beijing 100190, China
[2] Graduate University, Chinese Academy of Sciences, Beijing 100049, China
关键词
Compilation and indexing terms; Copyright 2024 Elsevier Inc;
D O I
暂无
中图分类号
学科分类号
摘要
Radio waves - Authentication - Cost benefit analysis - Radio frequency identification (RFID)
引用
收藏
页码:583 / 592
相关论文
共 50 条
  • [1] Research on Hash-Based low-cost RFID Security Authentication Protocol
    Huo Lin
    Jiang Yilin
    Hu Liangqing
    [J]. ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1524 - 1530
  • [2] Hash-based RFID Mutual Authentication Protocol
    Liu, Yang
    Peng, Yu
    Wang, Bailing
    Qu, Yun
    Bai, Xuefengi
    Yuan, Xinling
    Yin, Zelong
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 183 - 194
  • [3] A Lightweight Hash-Based Mutual Authentication Protocol for RFID
    Li, Zhangbing
    Zhong, Xiaoyong
    Chen, Xiaochun
    Liu, Jianxun
    [J]. MANAGEMENT OF INFORMATION, PROCESS AND COOPERATION, 2017, 686 : 87 - 98
  • [4] Enhanced Hash-Based RFID Mutual Authentication Protocol
    Kim, Hyunsung
    [J]. COMPUTER APPLICATIONS FOR SECURITY, CONTROL AND SYSTEM ENGINEERING, 2012, 339 : 70 - 77
  • [5] Improvement of the Hash-Based RFID Mutual Authentication Protocol
    Dehkordi, Masoud Hadian
    Farzaneh, Yousof
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2014, 75 (01) : 219 - 232
  • [6] Improvement of the Hash-Based RFID Mutual Authentication Protocol
    Masoud Hadian Dehkordi
    Yousof Farzaneh
    [J]. Wireless Personal Communications, 2014, 75 : 219 - 232
  • [7] Research on RFID Security Authentication Protocol Based on HASH Function
    Chen, Zhen-huan
    Pan, Xue-feng
    [J]. 2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 251 - 255
  • [8] Research on a provable security RFID authentication protocol based on Hash function
    Yu Yinhui
    Zhang Lei
    [J]. The Journal of China Universities of Posts and Telecommunications, 2016, (02) : 31 - 37
  • [9] Research on a provable security RFID authentication protocol based on Hash function
    Yu Yinhui
    Zhang Lei
    [J]. The Journal of China Universities of Posts and Telecommunications., 2016, 23 (02) - 37
  • [10] Research on a provable security RFID authentication protocol based on Hash function
    [J]. Yinhui, Yu (yuyh@jlu.edu.cn), 2016, Beijing University of Posts and Telecommunications (23):