搜索结果: 1-9 共查到“密码学 RFID Systems”相关记录9条 . 查询时间(0.109 秒)
Privacy of Stateful RFID Systems with Constant Tag Identifiers
RFID scheme security privacy
2019/7/18
There is a major interest in designing RFID schemes based on symmetric-key cryptography and ensuring efficient tag identification. These requirements taken together often lead to a decrease in the deg...
Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard
RFID authentication protocol EPC Forward secrecy integrity
2013/4/19
Radio Frequency IDentification (RFID) technology is a wireless identification method in which security and privacy are important parameters for public acceptance and widespread use. In order to thwart...
Cryptanalysis of Cho \textit{et al.}'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems
RFID Authentication Desynchronization Attack Tag Impersonation Attack
2011/7/25
Radio frequency identification systems need protocols to provide confidentiality, user privacy, mutual authentication and etc.
Cryptanalysis of Cho \textit{et al.}'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems
cryptographic protocols / RFID Authentication Desynchronization Attack Tag Impersonation Attack Reader Impersonation Attack
2012/3/27
Radio frequency identification systems need protocols to provide confidentiality, user privacy, mutual authentication and etc. These protocols should resist active and passive attacks such as forgery,...
Cryptanalysis of Some Protocols for RFID Systems
RFID Lightweight Mutual Authentication Ownership Transfer Protocol PUF LFSR
2011/2/23
In this paper we analyze the security of the mutual authentication and ownership transfer protocols which have been recently proposed by Kulseng \textit{et al.} Our analysis demonstrates a variety of ...
In this paper we analyze the security of the mutual authentication and ownership transfer protocols which have been recently proposed by Kulseng \textit{et al.} Our analysis demonstrates a variety of ...
Passive Cryptanalysis of Unconditionally Secure Authentication Protocol for RFID Systems
RFID Authentication Protocol Passive Attack
2010/9/3
Recently, Alomair et al. proposed the rst UnConditionally Secure mutual authentication protocol for low-cost RFID systems(UCS- RFID). The security of the UCS-RFID relies on ve dynamic secret keys whic...
Readers Behaving Badly:Reader Revocation in PKI-Based RFID Systems
Reader Revocation PKI-Based RFID Systems
2009/9/27
Recent emergence of relatively inexpensive RFID tags capable of performing pub-
lic key operations motivates new RFID applications, including electronic travel documents,
identification cards and pa...
A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems
mutual authentication RFID system binary search quadratic residues
2008/8/22
In 2004, Ari Juels [1] proposed a Yoking-Proofs protocol for RFID systems. The aim is to permit tags to generate a proof which is verifiable off-line by a trusted entity even when the readers are pote...