• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 15
Next 10 →

Security analysis of two ultra-lightweight RFID authentication protocols

by Tieyan Li, Guilin Wang - In IFIP SEC , 2007
"... Abstract. In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and M 2 AP, which are recently proposed by Peris-Lopez et al. We identify two effective attacks, namely De-synchronization attack and Full-disclosure attack, against t ..."
Abstract - Cited by 40 (2 self) - Add to MetaCart
Abstract. In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and M 2 AP, which are recently proposed by Peris-Lopez et al. We identify two effective attacks, namely De-synchronization attack and Full-disclosure attack, against

Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols

by Tieyan Li, Guilin Wang, Robert H. Deng
"... Abstract — In this paper, we analyze the security vulnerabilities of a family of ultra-lightweight RFID mutual authentication protocols: LMAP [13], M 2 AP [14] and EMAP [15], which are recently proposed by Peris-Lopez et al. We identify two effective attacks, namely de-synchronization attack and ful ..."
Abstract - Cited by 5 (0 self) - Add to MetaCart
Abstract — In this paper, we analyze the security vulnerabilities of a family of ultra-lightweight RFID mutual authentication protocols: LMAP [13], M 2 AP [14] and EMAP [15], which are recently proposed by Peris-Lopez et al. We identify two effective attacks, namely de-synchronization attack

1 Recursive Linear and Differential Cryptanalysis of Ultralightweight Authentication Protocols

by Zahra Ahmadian, Mahmoud Salmasizadeh, Mohammad Reza Aref
"... Abstract—Privacy is faced to serious challenges in the ubiquitous computing world. In order to handle this problem, some researches in recent years have focused on design and analysis of privacy friendly ultralightweight authentication protocols. In less than a decade, many ultralightweight authenti ..."
Abstract - Add to MetaCart
Abstract—Privacy is faced to serious challenges in the ubiquitous computing world. In order to handle this problem, some researches in recent years have focused on design and analysis of privacy friendly ultralightweight authentication protocols. In less than a decade, many ultralightweight

K.-H.: On the Security of Chien’s Ultralightweight RFID Authentication Protocol. Cryptology ePrint Archive

by Hung-min Sun, Wei-chih Ting, King-hang Wang
"... Abstract. Recently, Chien proposed an ultralightweight RFID authentication protocol to prevent all possible attacks. However, we find two de-synchronization attacks to break the protocol. Key words: RFID, cryptanalysis, identification protocols 1 ..."
Abstract - Cited by 17 (1 self) - Add to MetaCart
Abstract. Recently, Chien proposed an ultralightweight RFID authentication protocol to prevent all possible attacks. However, we find two de-synchronization attacks to break the protocol. Key words: RFID, cryptanalysis, identification protocols 1

ULMAP: Ultralightweight NFC Mutual Authentication Protocol with Pseudonyms in the Tag for IoT in 5G

by Kai Fan , Panfei Song , Yintang Yang
"... As one of the core techniques in 5G, the Internet of Things (IoT) is increasingly attracting people's attention. Meanwhile, as an important part of IoT, the Near Field Communication (NFC) is widely used on mobile devices and makes it possible to take advantage of NFC system to complete mobile ..."
Abstract - Add to MetaCart
considering the security and privacy, and most of the protocols are heavyweight. In order to overcome these problems, this paper proposes an ultralightweight mutual authentication protocol, named ULMAP. ULMAP only uses Bit and XOR operations to complete the mutual authentication and prevent the denial

Using BubbleStorm Accepted Master-Thesis from Marcel Lucas

by Assessor Prof Alej, Ro P. Buchmann, Ph. D
"... Hiermit versichere ich, die vorliegende Master-Thesis ohne Hilfe Dritter nur mit den angegebenen Quellen und Hilfsmitteln angefertigt zu haben. Alle Stellen, die aus Quellen entnommen wurden, sind als solche kenntlich gemacht. Diese Arbeit hat in gleicher oder ähnlicher Form noch keiner Prüfungsbehö ..."
Abstract - Add to MetaCart
NVEs. The unstructured P2P system BubbleStorm offers flexible and scalable means and is therefore used as a fundamental base for the developed Pub/Sub system. As the evaluation of the subscription is performed

Human Trust Establishment

by Michael Farb, Manish Burman, Gurtej Singh Ch, Jon Mccune, Adrian Perrig, Michael Farb, Manish Burman, Gurtej Singh, Chandok Jon, Mccune Adrian Perrig , 2011
"... Users regularly experience a crisis of confidence on the Internet. Is that email truly originating from the claimed individual? Is that Facebook invitation indeed from that person or is it a fake page set up by an impersonator? These doubts are usually resolved through a leap of faith, expressing th ..."
Abstract - Add to MetaCart
the desperation of users. To establish a secure basis for Internet communication, we propose SafeSlinger, a system leveraging the proliferation of smartphones to enable people to securely and privately exchange their public keys. Through the exchanged authentic public key, SafeSlinger establishes a secure channel

MPEG-4 for Interactive Low-delay Real-time Communication

by Olaf L, Gary Minden , 2003
"... ii Internet broadcasting techniques are wide spread and have been the focus off many research projects. Due to high transmission delays these systems often lack interactivity. This thesis introduces a new streaming system to deliver real-time video and audio data with low-delays across the Internet. ..."
Abstract - Add to MetaCart
ii Internet broadcasting techniques are wide spread and have been the focus off many research projects. Due to high transmission delays these systems often lack interactivity. This thesis introduces a new streaming system to deliver real-time video and audio data with low-delays across the Internet. Packet loss, jitter and changing bandwidth availability describe the challenges that have to be handled by the system, since the Internet is a best effort network and does not guarantee quality of service. To lower bit-rates audio and video data are usually compressed in formats like MPEG-4. The high compression nearly eliminates redundancy in the audio and video data. A resultant loss of transmitted data and transmission errors can have big impact on the quality of the received stream. MPEG-4 video uses inter frame prediction, so errors propagate between frames. We will argue that retransmission of lost or invalid data is not feasible for low-delay communication due to high control loop delays.

unknown title

by unknown authors
"... ..."
Abstract - Add to MetaCart
Abstract not found

Secure Geographic Routing in Wireless Sensor Networks

by unknown authors , 2013
"... the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Auth ..."
Abstract - Add to MetaCart
the non-exclusive right to publish the Work electronically and in a non-commercial purpose make it accessible on the Internet. The Author warrants that he/she is the author to the Work, and warrants that the Work does not contain text, pictures or other material that violates copyright law. The Author shall, when transferring the rights of the Work to a third party (for example a publisher or a company); acknowledge the third party about this agreement. If the Author has signed a copyright agreement with a third party regarding the Work, the Author warrants hereby that he/she has obtained any necessary permission from this third party to let Chalmers University of Technology and University of Gothenburg store the Work electronically and make it accessible on the Internet.
Next 10 →
Results 1 - 10 of 15
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University