A Security and Performance Evaluation of Hash-Based Rfid Protocols
In this paper, we perform a security and performance evaluation on the various hash-based RFID identification and authentication protocols that have been proposed in the research literature. We compare the level of security offered by each of the schemes by examining whether they satisfy a set of se...
Saved in:
Main Authors: | Lim, Tong-Lee, Li, Tieyan, Li, Yingjiu |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2008
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/443 http://dx.doi.org/10.1007/978-3-642-01440-6_30 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup
by: LIANG, Bing, et al.
Published: (2009) -
A survey on privacy frameworks for RFID authentication
by: SU, Chunhua, et al.
Published: (2012) -
The Security and Improvement of An Ultra-Lightweight RFID Authentication Protocol
by: LI, Tieyan, et al.
Published: (2008) -
Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer
by: PERIS-LOPEZ, Pedro, et al.
Published: (2010) -
Security analysis on a family of ultra-lightweight RFID authentication protocols
by: LI, Tieyan, et al.
Published: (2008)