A Secured RFID Lightweight Authentication Protocol based on Elliptic Curve Cryptography using modified PRNG Algorithm
暂无分享,去创建一个
[1] Ying Zhang,et al. Tree-LSHB+: An LPN-Based Lightweight Mutual Authentication RFID Protocol , 2013, Wirel. Pers. Commun..
[2] Ethiopia Nigussie,et al. An Elliptic Curve-based Mutual Authentication Scheme for RFID Implant Systems , 2014, ANT/SEIT.
[3] Satyajeet Kumar,et al. Bank Locker Security System based on RFID and GSM Technology , 2016 .
[4] Feng Xiao,et al. Security Protocol for RFID System Conforming to EPC-C1G2 Standard , 2013, J. Comput..
[5] Hung-Min Sun,et al. A Gen2-Based RFID Authentication Protocol for Security and Privacy , 2009, IEEE Transactions on Mobile Computing.
[6] Donghoon Lee,et al. Security Analysis and Improvements of Two-Factor Mutual Authentication with Key Agreement in Wireless Sensor Networks , 2014, Sensors.
[7] Rui Zhang,et al. Mutual Authentication Protocol for RFID Based on ECC , 2017, 22017 IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC).
[8] Samuel Gorenstein,et al. Testing a random number generator , 1967, CACM.
[9] Bruce Schneier,et al. Cryptanalytic Attacks on Pseudorandom Number Generators , 1998, FSE.
[10] Omar Salhab,et al. SURVEY PAPER : PSEUDO RANDOM NUMBER GENERATORS AND SECURITY TESTS , 2018 .
[11] Juan E. Tapiador,et al. EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.
[12] Hung-Yu Chien. Efficient authentication scheme with tag-identity protection for EPC Class 2 Generation 2 version 2 standards , 2017, Int. J. Distributed Sens. Networks.
[13] Xianghua Xu,et al. An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol , 2013, J. Comput..
[14] Yalin Chen,et al. An efficient RFID mutual authentication scheme based on ECC , 2011, IACR Cryptol. ePrint Arch..
[15] Mike Burmester,et al. The Security of EPC Gen2 Compliant RFID Protocols , 2008, ACNS.
[16] Fumio Teraoka,et al. Privacy protection for low-cost RFID tags in IoT systems , 2012, CFI.
[17] David Pointcheval,et al. Security analysis of pseudo-random number generators with input: /dev/random is not robust , 2013, CCS.
[18] R. C. Fairfield,et al. An LSI Random Number Generator (RNG) , 1985, CRYPTO.
[19] DOMINGO V. ORIGINES,et al. A Novel Pseudo-Random Number Generator Algorithm based on Entropy Source Epoch Timestamp , 2019, 2019 International Conference on Information and Communications Technology (ICOIACT).
[20] Abdelshakour Abuzneid,et al. Comparison and Feasibility of Various RFID Authentication Methods Using ECC , 2018, Sensors.
[21] Gökhan Dalkiliç,et al. An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP , 2017, J. Sensors.
[22] Chih-Ming Hsiao,et al. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol , 2014, Ad Hoc Networks.
[23] Ayad Al-Adhami,et al. A 256 bit implementation of ECC-RFID based system using Shamir secret sharing scheme and Keccak hash function , 2017, 2017 Ninth International Conference on Ubiquitous and Future Networks (ICUFN).
[24] Eun-Jun Yoon. Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard , 2012, Expert Syst. Appl..
[25] Elaine B. Barker,et al. A Statistical Test Suite for Random and Pseudorandom Number Generators for Cryptographic Applications , 2000 .
[26] Sarangapani Jagannathan,et al. EPC Gen2v2 RFID Standard Authentication and Ownership Management Protocol , 2016, IEEE Transactions on Mobile Computing.
[27] Abu Bakar Ibrahim,et al. Attendance System using RFID with “Drive Thru” Techniques , 2018 .
[28] Vidyasagar Potdar,et al. A Survey of RFID Authentication Protocols , 2008, 22nd International Conference on Advanced Information Networking and Applications - Workshops (aina workshops 2008).
[29] Keith Martin,et al. Ultra-lightweight Mutual Authentication Protocols: Weaknesses and Countermeasures , 2013, 2013 International Conference on Availability, Reliability and Security.
[30] Zhiyang Li,et al. A protocol for detecting missing target tags in RFID systems , 2019, J. Netw. Comput. Appl..
[31] Hamid Barati,et al. An efficient and secure RFID authentication protocol using elliptic curve cryptography , 2019, Wirel. Networks.
[32] Chris J. Mitchell,et al. Scalable RFID security protocols supporting tag ownership transfer , 2011, Comput. Commun..