Sciweavers

62 search results - page 5 / 13
» On the Security of Chien's Ultralightweight RFID Authenticat...
Sort
View
ACISP
2009
Springer
15 years 6 months ago
A Highly Scalable RFID Authentication Protocol
Jiang Wu, Douglas R. Stinson
NTMS
2008
IEEE
15 years 6 months ago
On the Authentication of RFID Systems with Bitwise Operations
—Due to the stringent computational capabilities of low-cost RFID tags, many lightweight authentication protocols have been proposed recently aiming to achieve secure authenticat...
Basel Alomair, Radha Poovendran
PERCOM
2009
ACM
15 years 6 months ago
Randomizing RFID Private Authentication
—Privacy protection is increasingly important during authentications in Radio Frequency Identification (RFID) systems. In order to achieve high-speed authentication in largescale...
Qingsong Yao, Yong Qi, Jinsong Han, Jizhong Zhao, ...
CORR
2008
Springer
98views Education» more  CORR 2008»
14 years 11 months ago
An Asymptotically Optimal RFID Authentication Protocol Against Relay Attacks
Abstract. Relay attacks are a major concern for RFID systems: during an authentication process an adversary transparently relays messages between a verifier and a remote legitimate...
Gildas Avoine, Aslan Tchamkerten
JSS
2006
65views more  JSS 2006»
14 years 11 months ago
Cryptanalysis of a hybrid authentication protocol for large mobile networks
In this paper we analyse a hybrid authentication protocol due to Chien and Jan, designed for use in large mobile networks. The proposed protocol consists of two sub-protocols, nam...
Qiang Tang, Chris J. Mitchell