Research of RFID certification security protocol based on hash function and DES algorithm

被引:0
|
作者
机构
[1] Xu, Bin
[2] Zhang, Li-Hui
[3] Tan, Xiao-Pin
来源
| 1600年 / Academy Publisher卷 / 08期
关键词
D O I
10.4304/jnw.8.10.2368-2375
中图分类号
学科分类号
摘要
引用
收藏
相关论文
共 50 条
  • [41] A scalable and provably secure hash-based RFID protocol
    Avoine, G
    Oechslin, P
    Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 110 - 114
  • [42] Improvement of the Hash-Based RFID Mutual Authentication Protocol
    Masoud Hadian Dehkordi
    Yousof Farzaneh
    Wireless Personal Communications, 2014, 75 : 219 - 232
  • [43] The RFID mechanism design based on CDMA and hash function
    Yu S.
    Yun P.
    International Journal of Radio Frequency Identification Technology and Applications, 2011, 3 (04) : 285 - 293
  • [44] An improved hash-based RFID two-way security authentication protocol and application in remote education
    Yang, Lvqing
    Wu, Qingqiang
    Bai, Youjing
    Zheng, Huiru
    Lin, Shufu
    JOURNAL OF INTELLIGENT & FUZZY SYSTEMS, 2016, 31 (05) : 2713 - 2720
  • [45] A One-way Hash based Low-cost Authentication Protocol with Forward Security in RFID System
    He Lei
    Lu Xin-mei
    Jin Song-he
    Cai Zeng-yu
    2010 2ND INTERNATIONAL ASIA CONFERENCE ON INFORMATICS IN CONTROL, AUTOMATION AND ROBOTICS (CAR 2010), VOL 2, 2010, : 269 - 272
  • [46] Research on Authentication Protocol of RFID Based on Multi-Level Security Policy
    Su, Qing
    Li, Yong-zhen
    INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND ARTIFICIAL INTELLIGENCE (ICCSAI 2014), 2015, : 128 - 131
  • [47] Enhance Neighbor Discovery Protocol Security by Using Secure Hash Algorithm
    Usman, Muhammad
    Kamboh, Usman Rauf
    Taqdees, Muhammad Danish
    Waheed, Zain
    Shehzad, Mehboob Nazim
    Zafar, Hamza
    4TH INTERNATIONAL CONFERENCE ON INNOVATIVE COMPUTING (IC)2, 2021, : 777 - 784
  • [48] Research on Multiple security authentication protocol in RFID System
    Xia, Hui
    FRONTIERS OF MECHANICAL ENGINEERING AND MATERIALS ENGINEERING II, PTS 1 AND 2, 2014, 457-458 : 770 - 773
  • [49] Marking Certification of Adaptive Probability Packet Based on Hash Function
    Wang Yan-hua
    Xu Xiu
    AUTOMATION EQUIPMENT AND SYSTEMS, PTS 1-4, 2012, 468-471 : 2002 - +
  • [50] On the Security of an ECC Based RFID Authentication Protocol
    Babaheidarian, Parisa
    Delavar, Mahshid
    Mohajeri, Javad
    2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 111 - 114