Security analysis of an RFID protocol based on insubvertible encryption

被引:0
|
作者
Wei, Yongzhuang [1 ,2 ]
Ouyang, Ning [1 ]
Ma, Chunbo [1 ]
机构
[1] School of Information and Communication, Guilin University of Electronic Technology, Guilin 541004, China
[2] State Key Laboratory of Information Security, Institute of Software, Chinese Academy of Sciences, Beijing 100190, China
关键词
11;
D O I
暂无
中图分类号
学科分类号
摘要
引用
收藏
页码:958 / 961
相关论文
共 50 条
  • [41] Research on hash-based RFID security authentication protocol
    Ding, Zhenhua
    Li, Jintao
    Feng, Bo
    Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2009, 46 (04): : 583 - 592
  • [42] Mutual Authentication Security RFID Protocol Based on Time Stamp
    Zhang, Changlun
    Zhang, Wenqi
    Mu, Haibing
    2015 FIRST INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE THEORY, SYSTEMS AND APPLICATIONS (CCITSA 2015), 2015, : 166 - 170
  • [43] Anti-Collision and Security Protocol of Logistics Warehouse Labels by Integrating RFID and Chaotic Encryption Algorithm
    Gu Y.
    Xia F.
    Wang W.
    Yang S.
    Ye Y.
    Applied Mathematics and Nonlinear Sciences, 2024, 9 (01)
  • [44] Optimization design of encryption protocol in network security protocol based on wireless network development
    Zhang, Ming
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2019, 37 (05) : 6099 - 6106
  • [45] Security of an RFID Protocol for Supply Chains
    van Deursen, Ton
    Radomirovic, Sasa
    PROCEEDINGS OF THE ICEBE 2008: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, 2008, : 568 - 573
  • [46] Multilevel Security Protocol using RFID
    Faiazuddin, Syed
    Rao, S. Venkat
    Rao, S. C. V. Ramana
    Rao, M. V. Sainatha
    Kumar, P. Sathish
    INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2011, 2 (02) : 129 - 133
  • [47] A Security Protocol Designed with Proxy for RFID
    Zhou Jun
    Xu Yong-jun
    Li Xiao-wei
    2012 WORLD AUTOMATION CONGRESS (WAC), 2012,
  • [48] Security analysis of RFID based on multiple readers
    Ma, Jia-lin
    Wei, Xu
    Liu, Jie
    2007 THIRD INTERNATIONAL CONFERENCE ON INTELLIGENT INFORMATION HIDING AND MULTIMEDIA SIGNAL PROCESSING, VOL 1, PROCEEDINGS, 2007, : 265 - 268
  • [49] Security Analysis of RFID based on Multiple Readers
    Jin, Bo
    Jin, Hongyu
    CEIS 2011, 2011, 15
  • [50] Security and Privacy Analysis of Song-Mitchell RFID Authentication Protocol
    Habibi, Mohammad Hassan
    Aref, Mohammad Reza
    WIRELESS PERSONAL COMMUNICATIONS, 2013, 69 (04) : 1583 - 1596