Forward private RFID authentication protocol based on universal hash function

被引:0
|
作者
机构
[1] [1,Gao, Shujing
[2] Wang, Hongjun
来源
Gao, S. (shujing_g@126.com) | 1600年 / Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong卷 / 10期
关键词
Hash functions;
D O I
10.12733/jics20101934
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [1] A Security RFID Authentication Protocol Based on Hash Function
    Yu Tian-tian
    Feng Quan-yuan
    IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 804 - 807
  • [2] Research on RFID Security Authentication Protocol Based on HASH Function
    Chen, Zhen-huan
    Pan, Xue-feng
    2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 251 - 255
  • [3] An Improvement RFID Security Authentication Protocol Based on Hash Function
    Sun, Haowen
    Li, Peng
    Xu, He
    Zhu, Feng
    INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 375 - 384
  • [4] Mobile RFID Mutual Authentication Protocol Based on Hash Function
    Yu, Wenjin
    Jiang, Yixiang
    2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 358 - 361
  • [5] Lightweight RFID Privacy Protocol Based on Universal Hash Function
    Gao, Shu-jing
    Zhang, Rui-quan
    PROCEEDINGS OF THE 5TH INTERNATIONAL SYMPOSIUM ON KNOWLEDGE ACQUISITION AND MODELING, 2015, 80 : 71 - 73
  • [6] Research on a provable security RFID authentication protocol based on Hash function
    Yu Yinhui
    Zhang Lei
    The Journal of China Universities of Posts and Telecommunications, 2016, (02) : 31 - 37
  • [7] Research on a provable security RFID authentication protocol based on Hash function
    Yu Yinhui
    Zhang Lei
    TheJournalofChinaUniversitiesofPostsandTelecommunications, 2016, 23 (02) : 31 - 37
  • [8] Research on a provable security RFID authentication protocol based on Hash function
    Yinhui, Yu (yuyh@jlu.edu.cn), 2016, Beijing University of Posts and Telecommunications (23):
  • [9] Lightweight RFID Bidirectional Authentication Protocol Based on Improved Hash Function
    Cao, Fang-Ming
    He, Xiao-Ping
    International Journal of Network Security, 2024, 26 (01) : 98 - 105
  • [10] Formal Verification of an RFID Authentication Protocol Based on Hash Function and Secret Code
    Woo-Sik, Bae
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 79 (04) : 2595 - 2609