搜索结果: 1-15 共查到“军队指挥学 RFID”相关记录104条 . 查询时间(0.171 秒)
On Designing Lightweight RFID Protocols for Medical IoT
RFID Authentication Ultralightweight
2019/7/23
Recently, in IEEE Transactions on Industrial Informatics, Fan et al. proposed a lightweight RFID protocol which has been suggested to be employed for protecting the Medical Privacy in an IoT system. H...
Privacy of Stateful RFID Systems with Constant Tag Identifiers
RFID scheme security privacy
2019/7/18
There is a major interest in designing RFID schemes based on symmetric-key cryptography and ensuring efficient tag identification. These requirements taken together often lead to a decrease in the deg...
Privacy and Reader-first Authentication in Vaudenay's RFID Model with Temporary State Disclosure
RFID scheme PUF authentication
2019/2/27
Privacy and mutual authentication under corruption with temporary state disclosure are two significant requirements for real-life applications of RFID schemes. No RFID scheme is known so far to meet t...
Destructive Privacy and Mutual Authentication in Vaudenay's RFID Model
RFID scheme security privacy
2019/1/26
With the large scale adoption of the Radio Frequency Identification (RFID) technology, a variety of security and privacy risks need to be addressed. Arguably, the most general and used RFID security a...
Security Analysis of Fan et al. Lightweight RFID Authentication Protocol for Privacy Protection in IoT
RFID IoT Secret disclosure
2018/5/2
The designers of Radio-Frequency IDentification (RFID) systems have a challenging task for proposing secure mutual authentication protocols for Internet of Things (IoT) applications. Recently, Fan et ...
Nowadays, RFID systems have earned an important place in our everyday lives. Its adoption is growing in areas where data security or privacy or both must be guaranteed. Since the RFID tag can be clone...
On the security of another CRC based ultralightweight RFID authentication protocol
RFID EPC-C1G2 Cyclic Redundancy Code
2017/11/1
Design of ultra-lightweight authentication protocols for RFID systems conformed with the EPC Class-1 Generation-2 standard is still a challenging issue in RFID security. Recently, Maurya et al. have p...
Security Analysis of an Ultra-lightweight RFID Authentication Protocol for M-commerce
Mobile commerce RFID Ultra-lightweight
2017/6/9
Over the last few years, more people perform their social activities on mobile devices, such as mobile payment or mobile wallet. Mobile commerce (m-commerce) refers to manipulating electronic commerce...
Exploiting Safe Error based Leakage of RFID Authentication Protocol using Hardware Trojan Horse
Hardware Trojan Horse LCMQ Safe Error
2016/12/26
Radio-Frequency Identification tags are used for several applications requiring authentication mechanisms, which if subverted can lead to dire consequences. Many of these devices are based on low-cost...
Security and privacy concerns have been growing with the increased usage of the RFID technology in our daily lives. To mitigate these issues, numerous privacy-friendly authentication protocols have be...
Game-Based Privacy Analysis of RFID Security Schemes for Confident Au-thentication in IoT
RFID authentication protocols Traceability attacks Internet of Things
2016/6/27
Recently, Radio Frequency Identification (RFID) and Near Field Communication (NFC) systems are found in various
user-friendly services that all of us deal with in our daily lives. As these systems ar...
LightSource: Ultra Lightweight Clone Detection of RFID Tags from Software Unclonable Responses
RFID based supply chain clone detection authentication
2016/6/15
Radio-Frequency Identification (RFID) tags have been widely used as a low-cost wireless method for detection of counterfeit product injection in supply chains. In order to adequately perform authentic...
Attacks on Secure Ownership Transfer for Multi-Tag Multi-Owner Passive RFID Environments
cryptanalysis anonymity RFID
2016/1/5
Sundaresan et al proposed recently a novel ownership transfer protocol for multi-tag multi-owner RFID environments that complies with the EPC Class1 Generation2 standard. The authors claim that this p...
Analysis and Enhancement of Desynchronization Attack on an Ultralightweight RFID Authentication Protocol
cryptanalysis identification protocol RFID security
2016/1/5
As low-cost RFID tags become more and more ubiquitous, it is necessary to design ultralightweight RFID
authentication protocols to prevent possible attacks and threats. We reevaluate Ahmadian et al.’...
Traceability Improvements of a New RFID Protocol Based On EPC C1G2
RFID authentication protocols Yu-Jehn protocol Privacy
2015/12/23
Radio Frequency Identification (RFID) applications have spread all over the world and, in order to provide their security and pri-vacy, researchers proposed different kind of protocols. In this pa-per...