期刊文献+

一种改进的轻量级RFID双向认证协议 被引量:2

原文传递
导出
摘要 针对现有RFID安全认证协议可能存在的安全问题,文章提出了一种改进的轻量级RFID双向认证协议。该协议改进了通信三方的安全性,同时在一定程度上减少了计算复杂度,并从安全性能方面与常用的安全协议进行了分析和比较,结果表明此协议安全可行。
出处 《保密科学技术》 2014年第5期43-46,共4页 Secrecy Science and Technology
  • 相关文献

参考文献3

二级参考文献45

  • 1周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. 被引量:211
  • 2Feldhofer M. Comparison of low-power implementations of Trivium and Grain//Proceedings of the Workshop on the State of the Art of Stream Ciphers (SASC 2007). Bochum, Germany, 2007:236-246.
  • 3Feldhofer M, Wolkerstorfer J. Strong crypto for RFID tags--A comparison of low-power hardware implementations//Proceedings of the IEEE International Symposium on Circuits and Systems (ISCAS 2007). New Orleans, USA, 2007, 27-30.
  • 4Haitner I, Reingold O, Vadhan S. Efficiency improvements in constructing pseudorandom generator from any one-way function//Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC 2010). Cambridge, USA, 2010: 437-446.
  • 5Juels A. RFID security and privacy: A research survey. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 381-394.
  • 6Juels A, Pappu R, Parno B. Unidirectional key distribution across time and space with applications to RFID security// Proceedings of the 17th USENIX Security Symposium. San Jose, Canada, 2008:75-90.
  • 7Molnar D, Wagner D. Privacy and security in library RFID.. Issues, practices, and arehitectures//Proceedings of the Conference on Computer and Communications Security (ACM CCS'04). Washington, USA, 2004:210-219.
  • 8Li Y, Ding X. Protecting RFID communications in supply chains//Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security (ASIACCS' 07). Singapore, Singapore, 2007: 234-241.
  • 9Ma C, Li Y, Deng R, Li T. RFID privacy.. Relation between two notions, minimal condition, and efficient construction// Proceedings of the 16th ACM Conference on Computer and Communications Security (ACM CCS- 09). Chicago, USA, 2009, 54-65.
  • 10Berbain C, Billet O, Etrog J, Gilbert H. An efficient forward private RFID protocol//Proceedings of the 16th ACM Conference on Computer and Communications Security (ACM CCS'09). Chicago, USA, 2009:43-53.

共引文献75

同被引文献28

  • 1冯登国.可证明安全性理论与方法研究[J].软件学报,2005,16(10):1743-1756. 被引量:102
  • 2Osaka K’Takagi T,Yamazaki K,et al. An efficient and secureRFID security method with ownership transfer[C]//LNCS4456: Proc of Computational Intelligence and Security-CIS2006.Berlin: Springer, 2006: 778-787.
  • 3Sabaragamu Koralalage KHS,Selim M R,Goto Y,et al.POPmethod:An approach to enhance the security and privacy ofRFID systems used in product lifecycle with an anonymousownership transferring mechanism[C].Seoul,Korea:Proceed-ings of the 2007 ACM symposium on Applied Computing,2007:270-275.
  • 4Song B, Mitchell C J. RFID authentication protocol forlowcost tags[C]//Proc of ACM Conf on Wireless NetworkSecurity-WiSec’08.New York: ACM, 2008: 140-147.
  • 5Zuo Y J. Changing Hands Together:A secure groupownership transfer protocol for RFID tags[C]//In Proc of43nd Hawaii International Conference on System Sciences,Hawaii, 2010: 1 - 10.
  • 6Yang M H. Secure multiple group ownership transferprotocol for mobile RFID[J]. Electronic Commerce Researchand Applications, 2012, 11(4): 361-373.
  • 7邵婧,陈越,常振华.RFID标签所有权转换模式及协议设计[J].计算机工程,2009,35(15):143-145. 被引量:12
  • 8张恒山,管会生,韩海强.RFID系统中基于公钥加密的相互认证协议[J].计算机工程与应用,2010,46(5):69-72. 被引量:15
  • 9金永明,孙惠平,关志,陈钟.RFID标签所有权转移协议研究[J].计算机研究与发展,2011,48(8):1400-1405. 被引量:33
  • 10李慧贤.轻量级RFID双向认证协议设计与分析[J].西安电子科技大学学报,2012,39(1):172-178. 被引量:11

引证文献2

二级引证文献4

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部