Author:
Wang Shaohui,Liu Sujuan,Chen Danwei
Publisher
Springer Berlin Heidelberg
Reference20 articles.
1. Lecture Notes in Computer Science;M. Feldhofer,2004
2. Lecture Notes in Computer Science;A. Juels,2005
3. Gilbert, H., Robshaw, M., Sibert, H.: An Active Attack Against HB+ - a Provably Secure Lightweight Authentication Protocol. IET Electronic Letters 41(21), 1169–1170 (2005)
4. Bringer, J., Chabanne, H., Dottax, E.: HB++: a Lightweight Authentication Protocol Secure against Some Attacks. In: Security, Privacy and Trust in Pervasive and Ubiquitous Computing, SecPerU 2006, pp. 28–33. IEEE Computer Society (2006)
5. Bringer, J., Chabanne, H.: Trusted-HB: A Low-Cost Version of HB+ Secure Against Man-in-the-Middle Attacks. IEEE Transactions on Information Theory 54(9), 4339–4342 (2008)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. Low-Cost RFID Authentication Protocol Based on Elliptic Curve Algorithm;International Journal of Interdisciplinary Telecommunications and Networking;2021-04
2. Authentication Protocol for Securing Internet of Things;Proceedings of the Fourth International Conference on Engineering & MIS 2018 - ICEMIS '18;2018
3. Cryptanalysis of Dimitriou's Key Evolving RFID Systems;Proceedings of the Fifth International Conference on Network, Communication and Computing - ICNCC '16;2016