Review of different classes of RFID authentication protocols
暂无分享,去创建一个
[1] Stefanos Gritzalis,et al. GHB #: A Provably Secure HB-Like Lightweight Authentication Protocol , 2012, ACNS.
[2] Lejla Batina,et al. RFID-Tags for Anti-counterfeiting , 2006, CT-RSA.
[3] Masoumeh Safkhani,et al. Journal of Computational and Applied Mathematics Cryptanalysis of the Cho Et Al. Protocol: a Hash-based Rfid Tag Mutual Authentication Protocol , 2022 .
[4] Paul Müller,et al. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers , 2004, IEEE Annual Conference on Pervasive Computing and Communications Workshops, 2004. Proceedings of the Second.
[5] Ari Juels,et al. Authenticating Pervasive Devices with Human Protocols , 2005, CRYPTO.
[6] Maode Ma,et al. An ultralightweight RFID authentication protocol with CRC and permutation , 2014, J. Netw. Comput. Appl..
[7] Aikaterini Mitrokotsa,et al. A comprehensive RFID solution to enhance inpatient medication safety , 2011, Int. J. Medical Informatics.
[8] Sasa Radomirovic,et al. Attacks on RFID Protocols , 2008, IACR Cryptol. ePrint Arch..
[9] Mehdi Hosseinzadeh,et al. A Novel Mutual RFID Authentication Protocol with Low Complexity and High Security , 2014 .
[10] Juan E. Tapiador,et al. RFID Systems: A Survey on Security Threats and Proposed Solutions , 2006, PWC.
[11] Mikhail Nesterenko,et al. RFID security without extensive cryptography , 2005, SASN '05.
[12] Sandra Dominikus,et al. Strong Authentication for RFID Systems Using the AES Algorithm , 2004, CHES.
[13] Gene Tsudik,et al. YA-TRAP: yet another trivial RFID authentication protocol , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).
[14] Sijo Joseph,et al. Secure E-ticketing System based on Mutual Authentication using RFID , 2015, WCI '15.
[15] Heyoung Lee,et al. The SAMS: Smartphone Addiction Management System and Verification , 2013, Journal of Medical Systems.
[16] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[17] Raphael C.-W. Phan,et al. Cryptanalysis of a New Ultralightweight RFID Authentication Protocol—SASI , 2009, IEEE Transactions on Dependable and Secure Computing.
[18] Yannick Seurin,et al. HB#: Increasing the Security and Efficiency of HB+ , 2008, EUROCRYPT.
[19] Jian Su,et al. SLAP: Succinct and Lightweight Authentication Protocol for low-cost RFID system , 2018, Wirel. Networks.
[20] Jorge Munilla,et al. HB-MP: A further step in the HB-family of lightweight authentication protocols , 2007, Comput. Networks.
[21] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[22] Gildas Avoine,et al. Time Measurement Threatens Privacy-Friendly RFID Authentication Protocols , 2010, RFIDSec.
[23] Nemai Chandra Karmakar. Handbook of Smart Antennas for RFID Systems , 2010 .
[24] Y. Zhang,et al. Scalable and distributed key array authentication protocol in radio frequency identification-based sensor systems , 2011, IET Commun..
[25] Mahdi R. Alaghband,et al. Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard , 2011, ArXiv.
[26] Chin-Ling Chen,et al. Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection , 2009, Eng. Appl. Artif. Intell..
[27] Song Han,et al. Mutual Authentication Protocol for RFID Tags Based on Synchronized Secret Information with Monitor , 2007, ICCSA.
[28] Robert H. Deng,et al. Vulnerability Analysis of EMAP-An Efficient RFID Mutual Authentication Protocol , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).
[29] KyungOh Lee,et al. An Advanced Mutual-Authentication Algorithm Using AES for RFID Systems , 2006 .
[30] Albert Levi,et al. Providing Resistance against Server Information Leakage in RFID Systems , 2011, 2011 4th IFIP International Conference on New Technologies, Mobility and Security.
[31] Sujuan Liu,et al. Security Analysis and Improvement on Two RFID Authentication Protocols , 2015, Wirel. Pers. Commun..
[32] Julien Bringer,et al. HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).
[33] Umar Mujahid,et al. RCIA: A New Ultralightweight RFID Authentication Protocol Using Recursive Hash , 2015, Int. J. Distributed Sens. Networks.
[34] Zhen Zhang,et al. A lightweight anti-desynchronization RFID authentication protocol , 2010, Inf. Syst. Frontiers.
[35] Eun-Jun Yoon,et al. Cryptanalysis and improvement of a new ultra-lightweight RFID authentication protocol with permutation , 2013 .
[36] Basel Alomair,et al. Scalable RFID Systems: A Privacy-Preserving Protocol with Constant-Time Identification , 2012, IEEE Trans. Parallel Distributed Syst..
[37] Eun-Jun Yoon,et al. A new ultra-lightweight RFID authentication protocol using merge and separation operations , 2013 .
[38] Ethiopia Nigussie,et al. An Elliptic Curve-based Mutual Authentication Scheme for RFID Implant Systems , 2014, ANT/SEIT.
[39] Yannick Seurin,et al. Good Variants of HB+ Are Hard to Find , 2008, Financial Cryptography.
[40] Albert Levi,et al. K-strong Privacy for Radio Frequency Identification Authentication Protocols Based on Physically Unclonable Functions , 2015, Wirel. Commun. Mob. Comput..
[41] Sang-Soo Yeo,et al. Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value , 2011, Comput. Commun..
[42] Tassos Dimitriou,et al. A secure and efficient RFID protocol that could make big brother (partially) obsolete , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications (PERCOM'06).
[43] Hung-Yu Chien,et al. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards , 2007, Comput. Stand. Interfaces.
[44] Gene Tsudik. A Family of Dunces: Trivial RFID Identification and Authentication Protocols , 2007, Privacy Enhancing Technologies.
[45] Liaojun Pang,et al. Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard , 2013, 2013 IEEE Wireless Communications and Networking Conference (WCNC).
[46] Juan E. Tapiador,et al. Advances in Ultralightweight Cryptography for Low-Cost RFID Tags: Gossamer Protocol , 2009, WISA.
[47] Mohammad Reza Aref,et al. Attacks on a Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard , 2011, WISTP.
[48] Zezhong Zhang,et al. An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography , 2014, Journal of Medical Systems.
[49] Ying Zhang,et al. Tree-LSHB+: An LPN-Based Lightweight Mutual Authentication RFID Protocol , 2013, Wirel. Pers. Commun..
[50] Mike Burmester,et al. Universally composable and forward-secure RFID authentication and authenticated key exchange , 2007, ASIACCS '07.
[51] Hyunsung Kim. Enhanced Hash-Based RFID Mutual Authentication Protocol , 2012 .
[52] Jue-Sam Chou. An efficient mutual authentication RFID scheme based on elliptic curve cryptography , 2013, The Journal of Supercomputing.
[53] Ayman I. Kayssi,et al. A PUF-based ultra-lightweight mutual-authentication RFID protocol , 2011, 2011 International Conference for Internet Technology and Secured Transactions.
[54] Tzong-Chen Wu,et al. Two RFID-Based Solutions for Secure Inpatient Medication Administration , 2011, Journal of Medical Systems.
[55] JaeCheol Ha,et al. Low-Cost and Strong-Security RFID Authentication Protocol , 2007, EUC Workshops.
[56] Juan E. Tapiador,et al. EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, OTM Workshops.
[57] Huang Shengye,et al. An enhanced security authentication protocol based on hash-lock for low-cost RFID , 2008, 2008 2nd International Conference on Anti-counterfeiting, Security and Identification.
[58] Atsuko Miyaji,et al. A Secure RFID Authentication Protocol with Low Communication Cost , 2009, 2009 International Conference on Complex, Intelligent and Software Intensive Systems.
[59] L. Batina,et al. EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol , 2008, 2008 IEEE International Conference on RFID.
[60] Ari Juels,et al. Strengthening EPC tags against cloning , 2005, WiSe '05.
[61] Yi-Chun Tsai,et al. Efficient Electronic Toll Collection Protocol for Intelligent Transport System , 2010 .
[62] Tao Huang,et al. A Trajectory Privacy Model for Radio-Frequency Identification System , 2016, Wirel. Pers. Commun..
[63] Zhen Zhang,et al. Design and Analysis for RFID Authentication Protocol , 2008, 2008 IEEE International Conference on e-Business Engineering.
[64] Chris J. Mitchell,et al. RFID authentication protocol for low-cost tags , 2008, WiSec '08.
[65] Balaji Srinivasan,et al. Evolution of Electronic Passport Scheme using Cryptographic Protocol along with Biometrics Authentication System , 2012 .
[66] Jehn-Ruey Jiang,et al. An Ultralightweight Mutual Authentication Protocol for EPC C1G2 RFID Tags , 2012, 2012 Fifth International Symposium on Parallel Architectures, Algorithms and Programming.
[67] Julien Bringer,et al. Cryptanalysis of EC-RAC, a RFID Identification Protocol , 2008, CANS.
[68] Matthew J. B. Robshaw,et al. An Active Attack Against HB +-A Provably Secure Lightweight Authentication Protocol , 2022 .
[69] Nai-Wei Lo,et al. An Efficient Mutual Authentication Scheme for EPCglobal Class-1 Generation-2 RFID System , 2007, EUC Workshops.
[70] Gökhan Dalkiliç,et al. An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP , 2017, J. Sensors.
[71] Umar Mujahid Khokhar,et al. A New Ultralightweight RFID Mutual Authentication Protocol: SASI Using Recursive Hash , 2016, Int. J. Distributed Sens. Networks.
[72] Zhan Yiju,et al. A Minimalist Mutual Authentication Protocol for RFID System & BAN Logic Analysis , 2008, 2008 ISECS International Colloquium on Computing, Communication, Control, and Management.
[73] Mohammad Esmaeildoust,et al. Analysis and Improvement of the Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard , 2014 .
[74] Ingrid Verbauwhede,et al. Anti-counterfeiting, Untraceability and Other Security Challenges for RFID Systems: Public-Key-Based Protocols and Hardware , 2010, Towards Hardware-Intrinsic Security.
[75] Xu Zhuang,et al. Security Issues in Ultralightweight RFID Authentication Protocols , 2018, Wirel. Pers. Commun..
[76] Xu Zhuang,et al. A New Ultralightweight RFID Protocol for Low-Cost Tags: R$$^{2}$$2AP , 2014, Wirel. Pers. Commun..
[77] Yu-Yi Chen,et al. A Design of Tamper Resistant Prescription RFID Access Control System , 2012, Journal of Medical Systems.
[78] Albert Levi,et al. An Efficient and Private RFID Authentication Protocol Supporting Ownership Transfer , 2013, LightSec.
[79] Juan E. Tapiador,et al. Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard , 2009, Comput. Stand. Interfaces.
[80] Yun Tian,et al. A New Ultralightweight RFID Authentication Protocol with Permutation , 2012, IEEE Communications Letters.
[81] R. C. Mittal,et al. A Hash Based Mutual RFID Tag Authentication Protocol in Telecare Medicine Information System , 2014, Journal of Medical Systems.
[82] Kazuo Ohta,et al. A Study on Computational Formal Verification for Practical Cryptographic Protocol: The Case of Synchronous RFID Authentication , 2011, Financial Cryptography Workshops.
[83] Serge Vaudenay,et al. On the Security of HB# against a Man-in-the-Middle Attack , 2008, ASIACRYPT.
[84] Donghyun Kim,et al. Strengthening barrier-coverage of static sensor network with mobile sensor nodes , 2016, Wirel. Networks.
[85] Wang Shaohui,et al. Analysis of Passive Attack on RFID Authentication Protocol ULAP , 2010 .
[86] Masoumeh Safkhani,et al. RFID in eHealth: How to Combat Medication Errors and Strengthen Patient Safety , 2013 .
[87] Philippe Oechslin,et al. A scalable and provably secure hash-based RFID protocol , 2005, Third IEEE International Conference on Pervasive Computing and Communications Workshops.
[88] Yue Wu,et al. An ECDLP-Based Randomized Key RFID Authentication Protocol , 2011, 2011 International Conference on Network Computing and Information Security.
[89] Juan E. Tapiador,et al. An Ultra Light Authentication Protocol Resistant to Passive Attacks under the Gen-2 Specification , 2009, J. Inf. Sci. Eng..
[90] Jing Li,et al. Cryptanalysis of the LMAP protocol: A low-cost RFID authentication protocol , 2017, 2017 29th Chinese Control And Decision Conference (CCDC).
[91] Hyunsung Kim. RFID Mutual Authentication Protocol based on Synchronized Secret , 2013 .
[92] Juan E. Tapiador,et al. Cryptanalysis of the SASI Ultralightweight RFID Authentication Protocol with Modular Rotations , 2008, ArXiv.
[93] JaeCheol Ha,et al. LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System , 2006, ICUCT.
[94] Adi Botea,et al. Tractable Multi-Agent Path Planning on Grid Maps , 2009, IJCAI.
[95] Jens-Peter Kaps,et al. Chai-Tea, Cryptographic Hardware Implementations of xTEA , 2008, INDOCRYPT.
[96] Joo Seok Song,et al. An Improvement in HB-Family Lightweight Authentication Protocols for Practical Use of RFID System , 2013 .
[97] Behzad Abdolmaleki,et al. Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags , 2014 .
[98] Tim Kerins,et al. Public-Key Cryptography for RFID-Tags , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[99] Jin-Young Choi,et al. Formal Verification of Cryptographic Protocol for Secure RFID System , 2008, 2008 Fourth International Conference on Networked Computing and Advanced Information Management.
[100] Young-Sik Jeong,et al. Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol , 2015, Comput. Math. Appl..
[101] Srinivas Sampalli,et al. Technique for preventing DoS attacks on RFID systems , 2010, SoftCOM 2010, 18th International Conference on Software, Telecommunications and Computer Networks.
[102] Juan E. Tapiador,et al. M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags , 2006, UIC.
[103] Tao Zhang,et al. An Enhanced 2-Pass Optimistic Anonymous RFID Authentication Protocol with Forward Security , 2009, 2009 5th International Conference on Wireless Communications, Networking and Mobile Computing.
[104] Niu Xin-xin. Provable secure mutual authentication protocol for RFID in the standard model , 2013 .
[105] Kwangjo Kim,et al. Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning , 2006 .
[106] Masoumeh Safkhani,et al. Cryptanalysis of Cho et al.'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems , 2011, IACR Cryptol. ePrint Arch..
[107] Zhenfu Cao,et al. Security Proof for the Improved Ryu-Yoon-Yoo Identity-Based Key Agreement Protocol , 2008, IACR Cryptol. ePrint Arch..
[108] Muhammad Torabi Dashti,et al. A Privacy-Friendly RFID Protocol Using Reusable Anonymous Tickets , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.
[109] Shai Halevi,et al. Tree-based HB protocols for privacy-preserving authentication of RFID tags , 2011, J. Comput. Secur..
[110] André Zúquete,et al. Massively Parallel Identification of Privacy-Preserving Vehicle RFID Tags , 2014, RFIDSec.
[111] Zhuzhong Qian,et al. ACSP: A Novel Security Protocol against Counting Attack for UHF RFID Systems , 2011, 2011 Fifth International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing.
[112] Muhammad Khurram Khan,et al. A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments , 2016, Journal of Medical Systems.
[113] Koutarou Suzuki,et al. Cryptographic Approach to “Privacy-Friendly” Tags , 2003 .
[114] Jerry den Hartog,et al. Formal Verification of Privacy for RFID Systems , 2010, 2010 23rd IEEE Computer Security Foundations Symposium.
[115] Hung-Yu Chien,et al. SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity , 2007, IEEE Transactions on Dependable and Secure Computing.
[116] Mostafa Belkasmi,et al. A novel mutual authentication scheme for low-cost RFID systems , 2016, 2016 International Conference on Wireless Networks and Mobile Communications (WINCOM).
[117] Jian Huang,et al. An approach to security and privacy of RFID system for supply chain , 2004, IEEE International Conference on E-Commerce Technology for Dynamic E-Business.
[118] Gökhan Dalkiliç,et al. Cryptographically Supported NFC Tags in Medication for Better Inpatient Safety , 2014, Journal of Medical Systems.
[119] Shanlin Yang,et al. Security and Privacy Analysis of Tree-LSHB+ Protocol , 2014, Wirel. Pers. Commun..
[120] Kaamran Raahemifar,et al. HPAP: A novel authentication scheme for RFID systems , 2013, 2013 26th IEEE Canadian Conference on Electrical and Computer Engineering (CCECE).
[121] Jie Li,et al. RSEL: revocable secure efficient lightweight RFID authentication scheme , 2014, Concurr. Comput. Pract. Exp..
[122] Bo Sheng,et al. Secure and Serverless RFID Authentication and Search Protocols , 2008, IEEE Transactions on Wireless Communications.
[123] Nora Cuppens-Boulahia,et al. KEDGEN2: A key establishment and derivation protocol for EPC Gen2 RFID systems , 2014, J. Netw. Comput. Appl..
[124] Xuefei Leng,et al. HB-MP+ Protocol: An Improvement on the HB-MP Protocol , 2008, 2008 IEEE International Conference on RFID.
[125] Hafize Şen Çakir,et al. Increasing key space at little extra cost in RFID authentications , 2014 .
[126] Yanjun Wang,et al. Securing RFID systems conforming to EPC Class 1 Generation 2 standard , 2010, Expert Syst. Appl..
[127] Xiaojun Zhang,et al. A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography , 2015, Journal of Medical Systems.
[128] Xu Zhuang,et al. Security Analysis of a new Ultra-lightweight RFID Protocol and Its Improvement , 2013, J. Inf. Hiding Multim. Signal Process..
[129] B. B. Gupta,et al. Cryptanalysis of a novel ultra-lightweight mutual authentication protocol for IoT devices using RFID tags , 2017, The Journal of Supercomputing.
[130] Yingjiu Li,et al. Protecting RFID communications in supply chains , 2007, ASIACCS '07.
[131] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.
[132] Xianghua Xu,et al. An One-way Hash Function Based Lightweight Mutual Authentication RFID Protocol , 2013, J. Comput..
[133] Manuel Blum,et al. Secure Human Identification Protocols , 2001, ASIACRYPT.
[134] Naveen K. Chilamkurti,et al. Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol , 2014, Journal of Medical Systems.
[135] Tassos Dimitriou,et al. A Lightweight RFID Protocol to protect against Traceability and Cloning attacks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).
[136] David A. Wagner,et al. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags , 2005, IACR Cryptol. ePrint Arch..
[137] Hung-Yu Chien,et al. Two RFID-based Solutions to Enhance Inpatient Medication Safety , 2011, Journal of Medical Systems.
[138] Dong Hoon Lee,et al. Efficient RFID Authentication Protocol for Ubiquitous Computing Environment , 2005, EUC Workshops.
[139] Zhenguo Zhao,et al. A Secure RFID Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptosystem , 2014, Journal of Medical Systems.
[140] Chih-Ming Hsiao,et al. A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol , 2014, Ad Hoc Networks.
[141] Paul Müller,et al. Providing Security and Privacy in RFID Systems Using Triggered Hash Chains , 2008, 2008 Sixth Annual IEEE International Conference on Pervasive Computing and Communications (PerCom).
[142] Tieyan Li,et al. Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols , 2007, SEC.
[143] Lejla Batina,et al. Untraceable RFID authentication protocols: Revision of EC-RAC , 2009, 2009 IEEE International Conference on RFID.
[144] Yanfei Liu. An Efficient RFID Authentication Protocol for Low-Cost Tags , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.
[145] Liaojun Pang,et al. Secure and efficient lightweight RFID authentication protocol based on fast tag indexing , 2014, Int. J. Commun. Syst..
[146] Mike Burmester,et al. Lightweight RFID authentication with forward and backward security , 2011, TSEC.
[147] Wei Zhang,et al. An Efficient Lightweight RFID Authentication Protocol with Strong Trajectory Privacy Protection , 2017, Wirel. Pers. Commun..
[148] Jian Shen,et al. An Efficient RFID Authentication Protocol Providing Strong Privacy and Security , 2016 .