Research on a provable security RFID authentication protocol based on Hash function

被引:0
|
作者
机构
[1] Yinhui, Yu
[2] Lei, Zhang
来源
Yinhui, Yu (yuyh@jlu.edu.cn) | 2016年 / Beijing University of Posts and Telecommunications卷 / 23期
关键词
Number:; -; Acronym:; NKRDPC; Sponsor: National Key Research and Development Program of China;
D O I
暂无
中图分类号
学科分类号
摘要
Authentication
引用
收藏
相关论文
共 50 条
  • [1] Research on a provable security RFID authentication protocol based on Hash function
    Yu Yinhui
    Zhang Lei
    [J]. The Journal of China Universities of Posts and Telecommunications., 2016, 23 (02) - 37
  • [2] Research on a provable security RFID authentication protocol based on Hash function
    Yu Yinhui
    Zhang Lei
    [J]. The Journal of China Universities of Posts and Telecommunications, 2016, (02) : 31 - 37
  • [3] Research on RFID Security Authentication Protocol Based on HASH Function
    Chen, Zhen-huan
    Pan, Xue-feng
    [J]. 2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 251 - 255
  • [4] A Security RFID Authentication Protocol Based on Hash Function
    Yu Tian-tian
    Feng Quan-yuan
    [J]. IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 804 - 807
  • [5] An Improvement RFID Security Authentication Protocol Based on Hash Function
    Sun, Haowen
    Li, Peng
    Xu, He
    Zhu, Feng
    [J]. INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 375 - 384
  • [6] Research on hash-based RFID security authentication protocol
    Ding, Zhenhua
    Li, Jintao
    Feng, Bo
    [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2009, 46 (04): : 583 - 592
  • [7] Research on Hash-Based low-cost RFID Security Authentication Protocol
    Huo Lin
    Jiang Yilin
    Hu Liangqing
    [J]. ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1524 - 1530
  • [8] Mobile RFID Mutual Authentication Protocol Based on Hash Function
    Yu, Wenjin
    Jiang, Yixiang
    [J]. 2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 358 - 361
  • [9] A Security-provable Authentication and Key Agreement Protocol in RFID System
    He Lei
    Gan Yong
    Li Na-Na
    Cai Zeng-Yu
    [J]. 2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15, 2007, : 2078 - 2080
  • [10] Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code
    Woo-Sik, Bae
    [J]. WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (04) : 2595 - 2609