SLAP: Succinct and Lightweight Authentication Protocol for low-cost RFID system
H Luo, G Wen, J Su, Z Huang - Wireless Networks, 2018 - Springer
Data security is crucial for a RFID system. Since the existing RFID mutual authentication
protocols encounter the challenges such as security risks, poor performance, an ultra …
protocols encounter the challenges such as security risks, poor performance, an ultra …
RCIA: A new ultralightweight RFID authentication protocol using recursive hash
U Mujahid, M Najam-ul-Islam… - International Journal of …, 2015 - journals.sagepub.com
RFID is one of the most protuberant systems in the field of ubiquitous computing. Since RFID
tags have limited computation capabilities, numerous ultralightweight authentication …
tags have limited computation capabilities, numerous ultralightweight authentication …
Ultralightweight RFID Authentication Protocols for Low‐Cost Passive RFID Tags
The field of pervasive computing especially the Internet of Things (IoT) network is evolving
due to high network speed and increased capacity offered by the 5G communication system …
due to high network speed and increased capacity offered by the 5G communication system …
A new ultralightweight RFID authentication protocol for passive low cost tags: KMAP
Abstract Radio Frequency IDentification (RFID) is one of the most promising identification
schemes in the field of pervasive systems. Unique identification and non-line of sight …
schemes in the field of pervasive systems. Unique identification and non-line of sight …
Efficient authentication for mobile and pervasive computing
B Alomair, R Poovendran - IEEE Transactions on Mobile …, 2012 - ieeexplore.ieee.org
With today's technology, many applications rely on the existence of small devices that can
exchange information and form communication networks. In a significant portion of such …
exchange information and form communication networks. In a significant portion of such …
Pitfalls in ultralightweight authentication protocol designs
This article introduces prudent engineering practices and offers recommendations to follow,
together with typical mistakes to avoid, when designing new ultralightweight authentication …
together with typical mistakes to avoid, when designing new ultralightweight authentication …
Privacy-friendly synchronized ultralightweight authentication protocols in the storm
In the recent years, there has been an increasing interest in the development of secure and
private authentication protocols for RFID. In order to suit the very lightweight nature of RFID …
private authentication protocols for RFID. In order to suit the very lightweight nature of RFID …
Yet another ultralightweight authentication protocol that is broken
Eghdamian and Samsudin published at ICIEIS 2011 an ultralightweight mutual
authentication protocol that requires few bitwise operations. The simplicity of the design …
authentication protocol that requires few bitwise operations. The simplicity of the design …
[图书][B] Security of ubiquitous computing systems: Selected topics
G Avoine, J Hernandez-Castro - 2021 - library.oapen.org
The chapters in this open access book arise out of the EU Cost Action project Cryptacus, the
objective of which was to improve and adapt existent cryptanalysis methodologies and tools …
objective of which was to improve and adapt existent cryptanalysis methodologies and tools …
Security analysis and improvement on two RFID authentication protocols
S Wang, S Liu, D Chen - Wireless Personal Communications, 2015 - Springer
Several lightweight RFID authentication protocols have been proposed to settle the security
and privacy problems. Nevertheless, most of these protocols are analyzed and they are not …
and privacy problems. Nevertheless, most of these protocols are analyzed and they are not …