Author:
Safkhani Masoumeh,Hosseinzadeh Mehdi,Namin Mojtaba Eslamnezhad,Rostampour Samad,Bagheri Nasour
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference13 articles.
1. Beaulieu, R., Shors, D., Smith, J., Treatman-Clark, S., Weeks, B., & Wingers, L. (2013). The SIMON and SPECK families of lightweight block ciphers. Cryptology ePrint archive, Report 2013/404. http://eprint.iacr.org/
2. Black, J., Cochran, M., & Shrimpton, T. (2005). On the impossibility of highly-efficient blockcipher-based hash functions. In Cramer, R. (Ed.) Advances in cryptology—EUROCRYPT 2005, proceedings, volume 3494 of Lecture notes in computer science (pp 526–541). Springer
3. Gao, L., Ma, M., Shu, Y., Lin, F., Zhang, L., & Wei, Y. (2014). A low-cost RFID authentication protocol against desynchronization with a random tuple. Wireless Personal Communications, 79(3), 1941–1958.
4. Jeon, I.-S., & Yoon, E.-J. (2013). A new ultra-lightweight RFID authentication protocol using merge and separation operations. International Journal of Mathematical Analysis, 7(52), 2583–2593.
5. Liao, Y.-P., & Hsiao, C.-M. (2014). A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol. Ad Hoc Networks, 18, 133–146.
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. LW-AKA: A Security Protocol for Integrated RFID and IoT Based Smart Home Security System;2019 IEEE International Symposium on Smart Electronic Systems (iSES) (Formerly iNiS);2019-12