Attacks and Improvements to an RFID Mutual Authentication Protocol
In WiSec'08, Song and Mitchell proposed an RFID mutual authentication protocol. Song also extended this protocol for RFID tag ownership transfer. These two protocols are designed to have the most security properties in the literature. We discover that, however, the mutual authentication protoco...
Saved in:
Main Authors: | CAI, Shaoying, LI, Yingjiu, LI, Tieyan, DENG, Robert H. |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2009
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/274 http://dx.doi.org/10.1145/1514274.1514282 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
RFID mutual authentication protocols with universally composable security
by: SU, Chunhua, et al.
Published: (2011) -
Vulnerability analysis of EMAP: An efficient RFID mutual authentication protocol
by: LI, Tieyan, et al.
Published: (2007) -
Time cost evaluation for executing RFID authentication protocols
by: CHIEW, Kevin, et al.
Published: (2010) -
The Security and Improvement of An Ultra-Lightweight RFID Authentication Protocol
by: LI, Tieyan, et al.
Published: (2008) -
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup
by: LIANG, Bing, et al.
Published: (2009)