Author:
Lei Miao,Li Hui,Liu Wenlong,Jin Dongxun
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference27 articles.
1. Qian, X., Liu, X., Yang, S., & Zuo, C. (2014). Security and privacy analysis of Tree-LSHB+ protocol. Wireless Personal Communications, 77(4), 3125–3141. doi: 10.1007/s11277-014-1699-x .
2. Deng, G., Li, H., Zhang, Y., & Wang, J. (2013). Tree-LSHB+: An LPN-based lightweight mutual authentication RFID protocol. Wireless Personal Communications, 72(1), 159–174. doi: 10.1007/s11277-013-1006-2 .
3. Hopper, N. J., & Blum, M. (2000). A secure human–computer authentication scheme. Technical report CMU-CS-00-139, Computer Science Department, Carnegie Mellon University, Paper 148.
4. Juels, A., & Weis, S. A. (2005). Authenticating pervasive devices with human. Protocols Crypto 2005 LNCS, 3621, 293–308.
5. Gilbert, H., Robshaw, M., & Silbert, H. (2005). An Active attack against HB+—A provably secure lightweight authentication protocol. Cryptology ePrint archive, report 2005/237. http://eprint.iacr.org/2005/237 .
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献