Security analysis of an RFID protocol based on insubvertible encryption

被引:0
|
作者
Wei, Yongzhuang [1 ,2 ]
Ouyang, Ning [1 ]
Ma, Chunbo [1 ]
机构
[1] School of Information and Communication, Guilin University of Electronic Technology, Guilin 541004, China
[2] State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
关键词
11;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:958 / 961
相关论文
共 50 条
  • [1] A secure RFID protocol based on insubvertible encryption using guardian proxy
    Osaka, Kyosuke
    Chang, Shuang
    Takagi, Tsuyoshi
    Yamazaki, Kenichi
    Takahashi, Osamu
    ARES 2008: PROCEEDINGS OF THE THIRD INTERNATIONAL CONFERENCE ON AVAILABILITY, SECURITY AND RELIABILITY, 2008, : 733 - +
  • [2] XTEA ENCRYPTION BASED NOVEL RFID SECURITY PROTOCOL
    Yu, Jack
    Khan, Gul
    Yuan, Fei
    2011 24TH CANADIAN CONFERENCE ON ELECTRICAL AND COMPUTER ENGINEERING (CCECE), 2011, : 58 - 62
  • [3] Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm
    Lijun Gao
    Lu Zhang
    Maode Ma
    Wireless Personal Communications, 2017, 96 : 683 - 696
  • [4] Low Cost RFID Security Protocol Based on Rabin Symmetric Encryption Algorithm
    Gao, Lijun
    Zhang, Lu
    Ma, Maode
    WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (01) : 683 - 696
  • [5] Lightweight encryption function structure protection of RFID security protocol
    Dantong, O. (ouyangdantong@163.com), 1600, Advanced Institute of Convergence Information Technology (04):
  • [6] Research on RFID Security Protocol Based on Grouped Tags and Re-encryption Scheme
    Piao, Chunhui
    Fan, Zhenjiang
    Yang, Chunyan
    Han, Xufang
    2010 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND INFORMATION SECURITY (WCNIS), VOL 1, 2010, : 568 - +
  • [7] Experimental analysis of an RFID security protocol
    Luo, Zongwei
    Chan, Terry
    Li, Jenny S.
    Wong, Edward
    Cheung, William
    Ng, Victor
    Fok, Wilton
    ICEBE 2006: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2006, : 62 - +
  • [8] Security analysis of an RFID tag search protocol
    Jannati, Hoda
    Bahrak, Behnam
    INFORMATION PROCESSING LETTERS, 2016, 116 (10) : 618 - 622
  • [9] On the Security of an ECC Based RFID Authentication Protocol
    Babaheidarian, Parisa
    Delavar, Mahshid
    Mohajeri, Javad
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 111 - 114
  • [10] Ultralightweight RFID Authentication Protocol Based on Permutation Matrix Encryption
    Hang, Tinghui
    Ding, Yong
    Wang, Zhen
    Wang, Huijiao
    2019 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2019, : 417 - 423