Security analysis of RAPP an RFID authentication protocol based on permutation

W Shao-hui, H Zhijie, L Sujuan… - Cryptology ePrint Archive, 2012 - eprint.iacr.org
One of the key problems in Radio Frequency Identification (RFID) is security and privacy.
Many RFID authentication protocols have been proposed to preserve security and privacy of …

Security analysis of LMAP++, an RFID authentication protocol

M Safkhani, N Bagheri, M Naderi… - … Conference for Internet …, 2011 - ieeexplore.ieee.org
Low cost Radio Frequency IDentification (RFID) tags are increasingly being deployed in
various practical applications these days. Security analysis of the way these tags are used in …

Tag impersonation attack on two RFID mutual authentication protocols

M Safkhani, N Bagheri, M Naderi… - … Reliability and Security, 2011 - ieeexplore.ieee.org
Security concerns of RFID systems engaged a lot of researchers to design and to
cryptanalyze RFID mutual authentication protocols. A suitable mutual authentication protocol …

Cryptanalysis of Cho\textit {et al.}'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems

M Safkhani, P Peris-Lopez… - Cryptology ePrint …, 2011 - eprint.iacr.org
Radio frequency identification systems need protocols to provide confidentiality, user
privacy, mutual authentication and etc. These protocols should resist active and passive …

Improvements over extended LMAP+: RFID authentication protocol

JB Gurubani, H Thakkar, DR Patel - Trust Management VI: 6th IFIP WG …, 2012 - Springer
Abstract Radio Frequency Identification (RFID) systems are increasingly being deployed in a
variety of applications. Widespread deployment of such contactless systems raises many …

Usage-based versus flat pricing for e-business services with differentiated qos

Z Liu, L Wynter, C Xia - … on E-Commerce, 2003. CEC 2003., 2003 - ieeexplore.ieee.org
Design of competitive e-commerce services, in such a quickly responding market, requires
the analyses of prices and price structures. We present a general model of an e-commerce …

[HTML][HTML] On the security of RFID anti-counting security protocol (ACSP)

M Safkhani, N Bagheri, A Mahani - Journal of Computational and Applied …, 2014 - Elsevier
Abstract Recently Qian et al.(2012)[26] have proposed a new attack for RFID systems, called
counting attack, where the attacker just aims to estimate the number of tagged objects …

Security analysis of two lightweight RFID authentication protocols

W Shao-hui, H Zhijie, L Sujuan, C Dan-wei - annals of telecommunications …, 2014 - Springer
One of the key problems in radio frequency identification (RFID) is security and privacy.
Many RFID authentication protocols have been proposed to preserve security and privacy of …

Cryptanalysis and enhancement of two low cost RFID authentication protocols

H Jannati, A Falahati - arXiv preprint arXiv:1202.1971, 2012 - arxiv.org
Widespread attention is recently paid upon RFID system structure considering its ease of
deployment over an extensive range of applications. Due to its several advantages, many …

Security analysis of a PUF based RFID authentication protocol

M Safkhani, N Bagheri, M Naderi - Cryptology ePrint Archive, 2011 - eprint.iacr.org
In this paper we consider the security of a PUF based RFID Authentication protocol which
has been recently proposed by Bassil et al. The designers have claimed that their protocol …