• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 48
Next 10 →

Symmetric key authentication using verification in

by Jaap-henk Hoepman
"... Abstract Several protocols for authentication using memory-constrained smart cards or tokens based on symmetric key cryptography are described. Key property of these protocols is that verification on the server can be performed in public based on (more or less) publicly known information. The protoc ..."
Abstract - Add to MetaCart
Abstract Several protocols for authentication using memory-constrained smart cards or tokens based on symmetric key cryptography are described. Key property of these protocols is that verification on the server can be performed in public based on (more or less) publicly known information

Ec-rac (ecdlp based randomized access control): Provably secure rfid authentication protocol

by Yong Ki Lee, Lejla Batina, Ingrid Verbauwhede - In Proc. of IEEE RFID , 2008
"... Abstract—Operational and security requirements for RFID systems such as system scalability, anonymity and anti-cloning are difficult to obtain due to constraints in area, memory, etc. Due to scarceness of resources most of the proposed protocols were designed using symmetric key cryptographic algori ..."
Abstract - Cited by 21 (5 self) - Add to MetaCart
Abstract—Operational and security requirements for RFID systems such as system scalability, anonymity and anti-cloning are difficult to obtain due to constraints in area, memory, etc. Due to scarceness of resources most of the proposed protocols were designed using symmetric key cryptographic

Analysis of an RFID Authentication Protocol in Accordance with EPC Standards

by Behzad Abdolmaleki, Hamidreza Bakhshi, Karim Baghery, Mohammad Reza Aref , 2014
"... Abstract—In the past few years, the design of RFID authentication protocols in accordance with the EPC Class-1 Generation-2 (EPC C1 G2) standards, has been one of the most important challenges in the information security domain. Although RFID systems provide user-friendly services for end-users, the ..."
Abstract - Add to MetaCart
Abstract—In the past few years, the design of RFID authentication protocols in accordance with the EPC Class-1 Generation-2 (EPC C1 G2) standards, has been one of the most important challenges in the information security domain. Although RFID systems provide user-friendly services for end

Weaknesses in a Recently Proposed RFID Authentication Protocol

by Mete Akgün, M. Ufuk Çaˇglayan
"... Abstract. Many RFID authentication protocols have been proposed to provide desired security and privacy level for RFID systems. Almost all of these protocols are based symmetric cryptography because of the limited resources of RFID tags. Recently Cheng et. al have been proposed an RFID security prot ..."
Abstract - Add to MetaCart
Abstract. Many RFID authentication protocols have been proposed to provide desired security and privacy level for RFID systems. Almost all of these protocols are based symmetric cryptography because of the limited resources of RFID tags. Recently Cheng et. al have been proposed an RFID security

1 A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem

by Yalin Chen, Jue-sam Chou, Chi-fong Lin, Cheng-lun Wu
"... Recently, many researchers have proposed RFID authentication protocols. These protocols are mainly consists of two types: symmetric key based and asymmetric key based. The symmetric key based systems usually have some weaknesses such as suffering brute force, de-synchronization, impersonation, and t ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Recently, many researchers have proposed RFID authentication protocols. These protocols are mainly consists of two types: symmetric key based and asymmetric key based. The symmetric key based systems usually have some weaknesses such as suffering brute force, de-synchronization, impersonation

Open Access Design of a Mutual Authentication Protocol for RFID Based on ECC

by Kang Hong-yan
"... Abstract: A low-cost, efficient and safe mutual authentication protocol for RFID based on elliptic curve cryptography (ECC) is proposed, specific to the security and privacy problem existed in the existing RFID authentication protocol, on the basis of deep analysis of the existing RFID protocol base ..."
Abstract - Add to MetaCart
Abstract: A low-cost, efficient and safe mutual authentication protocol for RFID based on elliptic curve cryptography (ECC) is proposed, specific to the security and privacy problem existed in the existing RFID authentication protocol, on the basis of deep analysis of the existing RFID protocol

Abstract Group-Based Private Authentication

by Gildas Avoine, Levente Buttyán
"... We propose a novel authentication scheme that ensures privacy of the provers. Our scheme is based on symmetrickey cryptography, and therefore, it is well-suited to resource constrained applications in large scale environments. A typical example for such an application is an RFID system, where the pr ..."
Abstract - Add to MetaCart
We propose a novel authentication scheme that ensures privacy of the provers. Our scheme is based on symmetrickey cryptography, and therefore, it is well-suited to resource constrained applications in large scale environments. A typical example for such an application is an RFID system, where

Practical Schemes For Privacy & Security Enhanced RFID (extended abstract

by Jaap-henk Hoepman, Rieks Joosten , 2009
"... Abstract. Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather cost ..."
Abstract - Cited by 2 (1 self) - Add to MetaCart
-grained management of access permissions to tags. In particular we propose an efficient mutual authentication protocol between a tag and a reader that achieves a reasonable level of privacy, using only symmetric key cryptography on the tag, while not requiring a costly key-search algorithm at the reader side

DESIGN AND IMPLEMENTATION OF A SECURITY LAYER FOR RFID SYSTEMS

by V. Alarcon-aquino, M. Dominguez-jimenez, C. Ohms, Fachhochschule Kiel
"... RFID (Radio Frequency Identification) is a technology whose employment will certainly grow in the following years. It is therefore necessary to consider the security issues that come out from the implementation of that type of systems. In this paper we present an approach to solve the security probl ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
algorithm based on a symmetric-key cryptosystem is RC4 implemented in a proposed modification to the existing WEP protocol to make it more secure in terms of message privacy. The proposed approach is implemented using VHDL in FPGAs communicated through RF transceivers. The results show that the security

Efficient Mutual Authentication for Multi-Domain RFID Systems Using Distributed Signatures

by Michael Braun, Ulrike Meyer, Susanne Wetzel
"... Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and readers, granting access to data, and revocation of readers turn into an administrative challenge. In this paper, we prop ..."
Abstract - Add to MetaCart
propose a new public-key-based mutual authentication protocol that addresses the reader revocation problem while maintaining efficiency and identity privacy. In addition, our new protocol integrates fine-grained access control and key establishment with mutual authentication. The core of our solution
Next 10 →
Results 1 - 10 of 48
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University