Sciweavers

62 search results - page 5 / 13
» On the Security of Chien's Ultralightweight RFID Authenticat...
Sort
View
ACISP
2009
Springer
15 years 4 months ago
A Highly Scalable RFID Authentication Protocol
Jiang Wu, Douglas R. Stinson
NTMS
2008
IEEE
15 years 4 months ago
On the Authentication of RFID Systems with Bitwise Operations
—Due to the stringent computational capabilities of low-cost RFID tags, many lightweight authentication protocols have been proposed recently aiming to achieve secure authenticat...
Basel Alomair, Radha Poovendran
PERCOM
2009
ACM
15 years 4 months ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...
CORR
2008
Springer
98views Education» more  CORR 2008»
14 years 9 months ago
An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks
Abstract. Relay attacks are a major concern for RFID systems: during an authentication process an adversary transparently relays messages between a verifier and a remote legitimate...
Gildas Avoine, Aslan Tchamkerten
JSS
2006
65views more  JSS 2006»
14 years 9 months ago
Cryptanalysis of a hybrid authentication protocol for large mobile networks
In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in large mobile networks. The proposed protocol consists of two sub-protocols, nam...
Qiang Tang, Chris J. Mitchell