Author:
Mujahid Umar,Najam-ul-Islam Muhammad,Sarwar Shahzad
Funder
Bahria University, Islamabad
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference50 articles.
1. Klimov, A., & Shamir, A. (2005). New applications of T-functions in block ciphers and hash functions. In Proceedings of FSE’05, volume 3557 of LNCS (pp. 18–31). Springer.
2. Mujahid, U., Najam-ul-Islam, M., & Ali Shami, M. (2015). RCIA: A new ultralightweight RFID authentication protocol using recursive hash. International Journal of Distributed Sensor Networks 2015, Article ID 642180. doi: 10.1155/2015/642180 .
3. Mujahid, U., & Najam-ul-Islam, M. (2015). Pitfalls in ultralightweight RFID authentication protocol. International Journal of Communication networks and information Security, 7(3), 169.
4. Peris-Lopez, P. Hernandez-Castro, J., et.al (2006). LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags. In Proceedings of 2nd workshop on RFID security (pp. 100–112), Austria.
5. Peris-Lopez, P., Hernandez, J. C., et.al (2006). EMAP: An efficient mutual-authentication protocol for low-cost RFID tags. In 1st International workshop on information security (OTM-2006) (pp. 352–361), France.
Cited by
30 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献