Analysis and Improvement of the Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard
暂无分享,去创建一个
Mohammad Esmaeildoust | Mehdi Hosseinzadeh | Masoud Mohammadi | M. Hosseinzadeh | M. Mohammadi | M. Esmaeildoust
[1] Ari Juels,et al. Shoehorning Security into the EPC Tag Standard , 2006, SCN.
[2] Hung-Yu Chien,et al. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.
[3] Mohammad Reza Aref,et al. Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard , 2011, WISTP.
[4] Masoumeh Safkhani,et al. Another Fallen Hash-Based RFID Authentication Protocol , 2012, WISTP.
[5] K. Burger. Rfid Security And Privacy Concepts Protocols And Architectures , 2016 .
[6] Julio C. Hernandez-Castro,et al. RFID Specification Revisited , 2008 .
[7] Vincent Rijmen,et al. ECRYPT yearly report on algorithms and keysizes , 2009 .
[8] Weijun Zhu,et al. Desynchronization Attacks on RFID Security Protocols , 2013 .
[9] Gene Tsudik,et al. YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[10] Chin-Ling Chen,et al. Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection , 2009, Eng. Appl. Artif. Intell..
[11] Yanjun Wang,et al. Securing RFID systems conforming to EPC Class 1 Generation 2 standard , 2010, Expert Syst. Appl..