Author:
Qian Xiaofei,Liu Xinbao,Yang Shanlin,Zuo Chao
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference31 articles.
1. Cho, J. S., & Park, J. J. (2012). High attack cost: Hash based RFID tag mutual authentication protocol. In 3rd international conference on computer science and its applications, lecture notes in electrical engineering (Vol. 114, pp. 113–120).
2. Hernandez-Castro, J. C., Peris-Lopez, P., Safkhani, M., Bagheri, N., & Naderi, M. (2012). Another fallen hash-based RFID authentication protocol. In WISTP 2012, lecture notes in computer science (Vol. 7322, pp. 29–37).
3. Zhou, S., Zhang, Z., Luo, Z., & Wong, E. C. (2010). A lightweight anti-desynchronization RFID authentication protocol. Information Systems Frontiers, 12(5), 521–528.
4. Quafi, K., Overbock, R., & Vaudenay S. (2008). On the security of HB# against a man-in-the-middle attack. In Proceedings of 14th international conference on the theory and application of cryptology and information security, 2010 (Vol. 5350, pp. 108–124).
5. Deng, G., Li, H., Zhang, Y., & Wang, J. (2013). Tree-LSHB+: An LPN-based lightweight mutual authentication RFID protocol. Wireless Personal Communications, 72(1), 159–174.
Cited by
8 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献