Algebraic Replay Attacks on Authentication in RFID Protocols
暂无分享,去创建一个
[1] Hung-Yu Chien,et al. A Lightweight RFID Protocol Using Substring , 2007, EUC.
[2] M. Benmohammed,et al. Vulnerabilities of two recently RFID authentication protocols , 2012, 2012 IEEE International Conference on Complex Systems (ICCS).
[3] Sasa Radomirovic,et al. Algebraic Attacks on RFID Protocols , 2009, WISTP.
[4] Kwangjo Kim,et al. RFID mutual Authentication Scheme based on Synchronized Secret Information , 2006 .
[5] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).
[6] Gerhard P. Hancke. Practical attacks on proximity identification systems , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[7] Sasa Radomirovic,et al. Attacks on RFID Protocols , 2008, IACR Cryptol. ePrint Arch..
[8] Patel,et al. Information Security: Theory and Practice , 2008 .
[9] Tianjie Cao,et al. Cryptanalysis of Two RFID Authentication Protocols , 2009, Int. J. Netw. Secur..
[10] Ajitha Rajan,et al. Requirements Coverage as an Adequacy Measure for Conformance Testing , 2008, ICFEM.
[11] Philip Wadler. Call-by-Value Is Dual to Call-by-Name - Reloaded , 2005, RTA.
[12] Abolfazl Falahati,et al. Cryptanalysis and enhancement of two low cost rfid authentication protocols , 2012, ArXiv.
[13] Sebastian Mödersheim,et al. OFMC: A symbolic model checker for security protocols , 2005, International Journal of Information Security.
[14] Rajiv Laroia,et al. A new paradigm for IP-based cellular networks , 2001 .
[15] Yanfei Liu. An Efficient RFID Authentication Protocol for Low-Cost Tags , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[16] Zhan Yiju,et al. A Minimalist Mutual Authentication Protocol for RFID System & BAN Logic Analysis , 2008, 2008 ISECS International Colloquium on Computing, Communication, Control, and Management.
[17] Jun Pang,et al. Improving Automatic Verification of Security Protocols with XOR , 2009, ICFEM.
[18] Sebastian Mödersheim,et al. The Open-Source Fixed-Point Model Checker for Symbolic Analysis of Security Protocols , 2009, FOSAD.
[19] Sebastian Mödersheim,et al. Algebraic Properties in Alice and Bob Notation , 2009, 2009 International Conference on Availability, Reliability and Security.
[20] Mathieu Turuani,et al. The CL-Atse Protocol Analyser , 2006, RTA.
[21] Min-Shiang Hwang,et al. A Mutual Authentication Protocol for RFID , 2011, IT Professional.