Security analysis of RAPP an RFID authentication protocol based on permutation
W Shao-hui, H Zhijie, L Sujuan… - Cryptology ePrint Archive, 2012 - eprint.iacr.org
One of the key problems in Radio Frequency Identification (RFID) is security and privacy.
Many RFID authentication protocols have been proposed to preserve security and privacy of …
Many RFID authentication protocols have been proposed to preserve security and privacy of …
Security analysis of LMAP++, an RFID authentication protocol
M Safkhani, N Bagheri, M Naderi… - … Conference for Internet …, 2011 - ieeexplore.ieee.org
Low cost Radio Frequency IDentification (RFID) tags are increasingly being deployed in
various practical applications these days. Security analysis of the way these tags are used in …
various practical applications these days. Security analysis of the way these tags are used in …
Tag impersonation attack on two RFID mutual authentication protocols
M Safkhani, N Bagheri, M Naderi… - … Reliability and Security, 2011 - ieeexplore.ieee.org
Security concerns of RFID systems engaged a lot of researchers to design and to
cryptanalyze RFID mutual authentication protocols. A suitable mutual authentication protocol …
cryptanalyze RFID mutual authentication protocols. A suitable mutual authentication protocol …
Cryptanalysis of Cho\textit {et al.}'s Protocol, A Hash-Based Mutual Authentication Protocol for RFID Systems
M Safkhani, P Peris-Lopez… - Cryptology ePrint …, 2011 - eprint.iacr.org
Radio frequency identification systems need protocols to provide confidentiality, user
privacy, mutual authentication and etc. These protocols should resist active and passive …
privacy, mutual authentication and etc. These protocols should resist active and passive …
Improvements over extended LMAP+: RFID authentication protocol
Abstract Radio Frequency Identification (RFID) systems are increasingly being deployed in a
variety of applications. Widespread deployment of such contactless systems raises many …
variety of applications. Widespread deployment of such contactless systems raises many …
Usage-based versus flat pricing for e-business services with differentiated qos
Design of competitive e-commerce services, in such a quickly responding market, requires
the analyses of prices and price structures. We present a general model of an e-commerce …
the analyses of prices and price structures. We present a general model of an e-commerce …
[HTML][HTML] On the security of RFID anti-counting security protocol (ACSP)
Abstract Recently Qian et al.(2012)[26] have proposed a new attack for RFID systems, called
counting attack, where the attacker just aims to estimate the number of tagged objects …
counting attack, where the attacker just aims to estimate the number of tagged objects …
Security analysis of two lightweight RFID authentication protocols
W Shao-hui, H Zhijie, L Sujuan, C Dan-wei - annals of telecommunications …, 2014 - Springer
One of the key problems in radio frequency identification (RFID) is security and privacy.
Many RFID authentication protocols have been proposed to preserve security and privacy of …
Many RFID authentication protocols have been proposed to preserve security and privacy of …
Cryptanalysis and enhancement of two low cost RFID authentication protocols
H Jannati, A Falahati - arXiv preprint arXiv:1202.1971, 2012 - arxiv.org
Widespread attention is recently paid upon RFID system structure considering its ease of
deployment over an extensive range of applications. Due to its several advantages, many …
deployment over an extensive range of applications. Due to its several advantages, many …
Security analysis of a PUF based RFID authentication protocol
M Safkhani, N Bagheri, M Naderi - Cryptology ePrint Archive, 2011 - eprint.iacr.org
In this paper we consider the security of a PUF based RFID Authentication protocol which
has been recently proposed by Bassil et al. The designers have claimed that their protocol …
has been recently proposed by Bassil et al. The designers have claimed that their protocol …