Research of RFID certification security protocol based on hash function and DES algorithm

被引:0
|
作者
机构
[1] Xu, Bin
[2] Zhang, Li-Hui
[3] Tan, Xiao-Pin
来源
| 1600年 / Academy Publisher卷 / 08期
关键词
D O I
10.4304/jnw.8.10.2368-2375
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [21] RFID Security Certification based on the Internet of Things
    Zhang, Meng
    Zhao, Zhen-Yu
    Yu, Song-Sen
    2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 755 - 760
  • [22] RFID Bi-directional Authentication Protocol Based on Random Number and Hash Function
    Liu Jian-dong
    Wang Ye-quan
    Zhang Xiao
    Shang Kai
    PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 919 - 922
  • [23] An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol
    Ren, Xuping
    Xu, Xianghua
    Li, Yunfa
    JOURNAL OF COMPUTERS, 2013, 8 (09) : 2405 - 2412
  • [24] Hash-based RFID Mutual Authentication Protocol
    Liu, Yang
    Peng, Yu
    Wang, Bailing
    Qu, Yun
    Bai, Xuefengi
    Yuan, Xinling
    Yin, Zelong
    INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 183 - 194
  • [25] AES Algorithm Applied on Security Protocol of RFID
    Han, Liquan
    Yuan, Fang
    Jiang, Yuqiang
    3RD AASRI CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND BIOINFORMATICS (CIB 2015), 2015, : 1 - 5
  • [26] A New RFID Secure Authentication Protocol Based on Hash
    Li Hai-lin
    Xu Peng-fei
    PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 429 - 432
  • [27] Research of New Index Generation Algorithm Based on Hash Function
    Xu, WenLong
    Tang, Zhuo
    Chen, Zhuo
    Li, RenFa
    PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2012, : 799 - 802
  • [28] Hash-based RFID security protocol using randomly key-changed identification procedure
    Zhai, Jia
    Park, Chang Mok
    Wang, Gi-Nam
    COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 296 - 305
  • [29] Slot Assignment Algorithm Based on Hash Function for Multi-target RFID System
    Zhang, Suman
    Qin, Cai
    Wang, Chaowei
    Wang, Weidong
    Zhang, Yinghai
    2018 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2018, : 583 - 587
  • [30] RFID mutual-authentication protocol with synchronous updated-keys based on Hash function
    School of Information Engineering, Jiangxi University of Science and Technology, Ganzhou
    341000, China
    J. China Univ. Post Telecom., 6 (27-35):