Security analysis of an RFID protocol based on insubvertible encryption

被引:0
|
作者
Wei, Yongzhuang [1 ,2 ]
Ouyang, Ning [1 ]
Ma, Chunbo [1 ]
机构
[1] School of Information and Communication, Guilin University of Electronic Technology, Guilin 541004, China
[2] State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
关键词
11;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:958 / 961
相关论文
共 50 条
  • [21] Authentication Protocol of RFID System Based on Security Policy
    Wang, Guichao
    Wang, Yan
    Li, Yongzhen
    2013 THIRD INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2013, : 1242 - 1246
  • [22] An Effective RFID Security Protocol Based on Secret Sharing
    Gao, Zhijian
    Jiang, Yi
    Lin, Zhenxiong
    PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 780 - 784
  • [23] Application of chaotic encryption algorithm based on variable parameters in RFID security
    Guo, Yi
    Yang, Jianfang
    Liu, Baolong
    EURASIP JOURNAL ON WIRELESS COMMUNICATIONS AND NETWORKING, 2021, 2021 (01)
  • [24] A security protocol for RFID traceability
    Gandino, Filippo
    Montrucchio, Bartolomeo
    Rebaudengo, Maurizio
    INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS, 2017, 30 (06)
  • [25] Application of chaotic encryption algorithm based on variable parameters in RFID security
    Yi Guo
    Jianfang Yang
    Baolong Liu
    EURASIP Journal on Wireless Communications and Networking, 2021
  • [26] On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis
    Bruce, Ndibanje
    Kim, HyunHo
    Kang, Young Jin
    Lee, Young Sil
    Lee, Hoon Jae
    2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 498 - 505
  • [27] A security protocol of RFID communication system based on password authenticated with provable security
    Li, Kun
    Liu, Jichao
    INTERNATIONAL JOURNAL OF AUTONOMOUS AND ADAPTIVE COMMUNICATIONS SYSTEMS, 2021, 14 (1-2) : 64 - 82
  • [28] Security protocol of internet of things based on NTRU encryption model
    Li Y.
    International Journal of Information and Communication Technology, 2021, 18 (02) : 125 - 141
  • [29] Security and privacy analysis of RFID authentication protocol for ubiquitous computing
    Kim, Hyun-Seok
    Choi, Jin-Young
    PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 1359 - +
  • [30] Simulation based analysis of RFID Protocol
    Madhusudan
    Singh, Joykaran
    PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1894 - 1897