期刊文献+
共找到2篇文章
< 1 >
每页显示 20 50 100
Research on a provable security RFID authentication protocol based on Hash function 被引量:4
1
作者 Yu Yinhui Zhang Lei 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2016年第2期31-37,共7页
Research on existing radio frequency identification(RFID) authentication protocols security risks, poor performance and other problems, a RFID security authentication protocol based on dynamic identification(ID) a... Research on existing radio frequency identification(RFID) authentication protocols security risks, poor performance and other problems, a RFID security authentication protocol based on dynamic identification(ID) and Key value renewal is proposed. Meanwhile, the security problems based on Hash function RFID security authentication protocol in recent years have been also sorted and analyzed. Then a security model to design and analyze RFID protocols is built. By using the computational complexity, its correctness and security have been proved. Compared with the safety performance, storage overhead, computational overhead and other aspects of other protocols, the protocol for RFID has more efficient performance and ability to withstand various attacks. And the C# programming language is used to simulate the authentication process on the visual studio platform, which verifies the feasibility of the protocol. 展开更多
关键词 mutual authentication protocol provable security method Hash function rfid system
原文传递
An Anti-Counterfeiting RFID Privacy Protection Protocol 被引量:2
2
作者 Xiaolan Zhang Brian King 《Journal of Computer Science & Technology》 SCIE EI CSCD 2007年第3期438-448,共11页
The privacy problem of many RFID systems has been extensively studied. Yet integrity in RFID has not received much attention as regular computer systems. When we evaluate an identification protocol for an RFID system ... The privacy problem of many RFID systems has been extensively studied. Yet integrity in RFID has not received much attention as regular computer systems. When we evaluate an identification protocol for an RFID system for anti-counterfeiting, it is important to consider integrity issues. Moreover, many RFID systems are accessed by multiple level trust parties, which makes comprehensive integrity protection even harder. In this paper, we first propose an integrity model for RFID protocols. Then we use the model to analyze the integrity problems in Squealing Euros protocol. Squealing Euros was proposed by Juels and Pappu for RFID enabled banknotes that will support anti-forgery and lawful tracing yet preserve individual's privacy. We analyze its integrity, we then discuss the problems that arise and propose some solutions to these problems. Then an improved protocol with integrity protection for the law enforcement is constructed, which includes an unforgeable binding between the banknote serial number and the RF ciphertext only readable to law enforcement. This same protocol can be applied in many other applications which require a privacy protecting anti-counterfeiting mechanism. 展开更多
关键词 rfid security INTEGRITY PRIVACY
原文传递
上一页 1 下一页 到第
使用帮助 返回顶部