Results 1 - 10
of
48
Symmetric key authentication using verification in
"... Abstract Several protocols for authentication using memory-constrained smart cards or tokens based on symmetric key cryptography are described. Key property of these protocols is that verification on the server can be performed in public based on (more or less) publicly known information. The protoc ..."
Abstract
- Add to MetaCart
Abstract Several protocols for authentication using memory-constrained smart cards or tokens based on symmetric key cryptography are described. Key property of these protocols is that verification on the server can be performed in public based on (more or less) publicly known information
Ec-rac (ecdlp based randomized access control): Provably secure rfid authentication protocol
- In Proc. of IEEE RFID
, 2008
"... Abstract—Operational and security requirements for RFID systems such as system scalability, anonymity and anti-cloning are difficult to obtain due to constraints in area, memory, etc. Due to scarceness of resources most of the proposed protocols were designed using symmetric key cryptographic algori ..."
Abstract
-
Cited by 21 (5 self)
- Add to MetaCart
Abstract—Operational and security requirements for RFID systems such as system scalability, anonymity and anti-cloning are difficult to obtain due to constraints in area, memory, etc. Due to scarceness of resources most of the proposed protocols were designed using symmetric key cryptographic
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards
, 2014
"... Abstract—In the past few years, the design of RFID authentication protocols in accordance with the EPC Class-1 Generation-2 (EPC C1 G2) standards, has been one of the most important challenges in the information security domain. Although RFID systems provide user-friendly services for end-users, the ..."
Abstract
- Add to MetaCart
Abstract—In the past few years, the design of RFID authentication protocols in accordance with the EPC Class-1 Generation-2 (EPC C1 G2) standards, has been one of the most important challenges in the information security domain. Although RFID systems provide user-friendly services for end
Weaknesses in a Recently Proposed RFID Authentication Protocol
"... Abstract. Many RFID authentication protocols have been proposed to provide desired security and privacy level for RFID systems. Almost all of these protocols are based symmetric cryptography because of the limited resources of RFID tags. Recently Cheng et. al have been proposed an RFID security prot ..."
Abstract
- Add to MetaCart
Abstract. Many RFID authentication protocols have been proposed to provide desired security and privacy level for RFID systems. Almost all of these protocols are based symmetric cryptography because of the limited resources of RFID tags. Recently Cheng et. al have been proposed an RFID security
1 A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem
"... Recently, many researchers have proposed RFID authentication protocols. These protocols are mainly consists of two types: symmetric key based and asymmetric key based. The symmetric key based systems usually have some weaknesses such as suffering brute force, de-synchronization, impersonation, and t ..."
Abstract
-
Cited by 1 (0 self)
- Add to MetaCart
Recently, many researchers have proposed RFID authentication protocols. These protocols are mainly consists of two types: symmetric key based and asymmetric key based. The symmetric key based systems usually have some weaknesses such as suffering brute force, de-synchronization, impersonation
Open Access Design of a Mutual Authentication Protocol for RFID Based on ECC
"... Abstract: A low-cost, efficient and safe mutual authentication protocol for RFID based on elliptic curve cryptography (ECC) is proposed, specific to the security and privacy problem existed in the existing RFID authentication protocol, on the basis of deep analysis of the existing RFID protocol base ..."
Abstract
- Add to MetaCart
Abstract: A low-cost, efficient and safe mutual authentication protocol for RFID based on elliptic curve cryptography (ECC) is proposed, specific to the security and privacy problem existed in the existing RFID authentication protocol, on the basis of deep analysis of the existing RFID protocol
Abstract Group-Based Private Authentication
"... We propose a novel authentication scheme that ensures privacy of the provers. Our scheme is based on symmetrickey cryptography, and therefore, it is well-suited to resource constrained applications in large scale environments. A typical example for such an application is an RFID system, where the pr ..."
Abstract
- Add to MetaCart
We propose a novel authentication scheme that ensures privacy of the provers. Our scheme is based on symmetrickey cryptography, and therefore, it is well-suited to resource constrained applications in large scale environments. A typical example for such an application is an RFID system, where
Practical Schemes For Privacy & Security Enhanced RFID (extended abstract
, 2009
"... Abstract. Proper privacy protection in RFID systems is important. However, many of the schemes known are impractical, either because they use hash functions instead of the more hardware efficient symmetric encryption schemes as a efficient cryptographic primitive, or because they incur a rather cost ..."
Abstract
-
Cited by 2 (1 self)
- Add to MetaCart
-grained management of access permissions to tags. In particular we propose an efficient mutual authentication protocol between a tag and a reader that achieves a reasonable level of privacy, using only symmetric key cryptography on the tag, while not requiring a costly key-search algorithm at the reader side
DESIGN AND IMPLEMENTATION OF A SECURITY LAYER FOR RFID SYSTEMS
"... RFID (Radio Frequency Identification) is a technology whose employment will certainly grow in the following years. It is therefore necessary to consider the security issues that come out from the implementation of that type of systems. In this paper we present an approach to solve the security probl ..."
Abstract
-
Cited by 2 (0 self)
- Add to MetaCart
algorithm based on a symmetric-key cryptosystem is RC4 implemented in a proposed modification to the existing WEP protocol to make it more secure in terms of message privacy. The proposed approach is implemented using VHDL in FPGAs communicated through RF transceivers. The results show that the security
Efficient Mutual Authentication for Multi-Domain RFID Systems Using Distributed Signatures
"... Abstract. The use of RFID technology in complex and distributed environments often leads to a multi-domain RFID system in which security issues such as authentication of tags and readers, granting access to data, and revocation of readers turn into an administrative challenge. In this paper, we prop ..."
Abstract
- Add to MetaCart
propose a new public-key-based mutual authentication protocol that addresses the reader revocation problem while maintaining efficiency and identity privacy. In addition, our new protocol integrates fine-grained access control and key establishment with mutual authentication. The core of our solution
Results 1 - 10
of
48