期刊文献+

浅谈基于哈希函数的RFID身份认证协议

Discussion of RFID identity authentication protocol based on hash function
下载PDF
导出
摘要 对基于哈希函数的RFID身份认证协议进行了简要的介绍,对多个协议的安全性能进行了详细的分析和比较,指出其存在的安全缺陷,并提出相应的改进思路。
作者 丁洁 王泽众
出处 《电子产品世界》 2016年第1期30-32,共3页 Electronic Engineering & Product World
基金 海南省自然科学基金(20156250 614231)
  • 相关文献

参考文献7

  • 1SARMA S E, WEIS S A, ENGELS D W RFID systems and security and privacy impficatJons[C].llProceedings of the 4th international Workshop on CryptographJc Hardware and Embedded Systems, New York: Springer-Verlag, 2002:454-469. 被引量:1
  • 2WEIS S A, SARMA S E, RIVEST R L, et aL Security and privacy aspecls of ow-cost radio frequency identification systems[J]. Security in Pervasive Computing, 2004, 28(2):201-212. 被引量:1
  • 3OHKUBO M, SUZUKI K, KINOSHITA S, Hash-chain based forward-secure privacy protection scheme for low-cost RFID[C].//Proceedings of 2004 Symposium on Cryptography and Information Secudty(SCIS 2004), Berlin: Springer-Verlag, 2004:719-724. 被引量:1
  • 4SHEN J, CHOI D, MOH S, et al. A novel anonymous RFID authentication protocol providing strong privacy and security[C]ll Proceedings of 2010 International Conference on Multimedia Information Networking and Secunty, Nanfing: ACM Press, 2010:584-588. 被引量:1
  • 5陆桑璐,谢磊编著..射频识别技术 原理、协议及系统设计[M].北京:科学出版社,2014:289.
  • 6田芸,陈恭亮,李建华.针对RFID身份认证协议——ARAP协议的攻击及改进[J].中国电子科学研究院学报,2011,6(6):556-560. 被引量:6
  • 7李景峰,郭卫锋.对ARAP认证协议的攻击及其改进[J].武汉大学学报(理学版),2012,58(6):526-530. 被引量:3

二级参考文献15

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2JUELS A. RFID Security and Privacy: A Research Sur- vey [J]. IEEE Journal on Selected Areas in Communica- tions, 2006, 24(2): 381-394. 被引量:1
  • 3WEISS A, SARMA S E, RIVEST R L, ENGELS D W. Security and Privacy Aspects of Low-Cost Radio Frequen- cy Identification Systems [ C ]. First International Confer- ence on Security in Pervasive Computing,2003:201-212. 被引量:1
  • 4SHEN J, CHOI D, MOH S, CHUNG I. A Novel Anony- mous RFID Authentication Protocol Providing Strong Pri- vacy and Security [ C ]. 2010 International Conference on Multimedia Information Networking and Security, 2010: 584-588. 被引量:1
  • 5KARTHIKEYAN S, NESTERENKO M. RFID Security with- out Extensive Cryptography [ C ]. The Third ACM Work- shop Security of Ad Hoc and Sensor Networks, 2005 : 63- 67. 被引量:1
  • 6SUN H M, TING W C, WANG K H. On the Security of Chien' s Ultralightweight RFID Authentication Protocol [J]. IEEE Transactions on Dependable and Secure Com- puting, 2011, 8(2): 315-317. 被引量:1
  • 7Sarma S E,Weis S A,Engels D W. RFID systems and security and privacy implications[C]//Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems, New York:Springer-Verlag, 2002 : 454-469. 被引量:1
  • 8Weis S A,Sarma S E,Rivest R L,et al. Security and privacy aspects of low-cost radio frequency identification systems[J]. Security in Pervasive Computing, 2004,28(2) :201-212. 被引量:1
  • 9Ohkubo M, Suzuki K, Kinoshita S. Hash-chain based forward secure privacy protection scheme for low-cost RFID[C]//Proceedings of the 2004 Symposium on Cryptography and Information Security, Berlin: Springer-Verlag, 2004 : 719-724. 被引量:1
  • 10Shen J, Choi D, Moh S, et al. A novel anonymous RFID authentication protocol providing strong privacy and security[C]//Proceedings of 2010 International Conference on Multimedia Information Networking and Security, Nanjing: ACM Press, 2010 : 584-588. 被引量:1

共引文献5

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部