搜索结果: 1-3 共查到“军队指挥学 RFID authentication protocols”相关记录3条 . 查询时间(0.078 秒)
Scalability and Security Conict for RFID Authentication Protocols
Scalability Security Conict RFID Authentication Protocols
2010/1/18
Many RFID authentication protocols have been proposed to
preserve security and privacy. Nevertheless, most of these protocols are
analyzed and it is shown that they can not provide security against ...
Efficient RFID authentication protocols based on pseudorandom sequence generators
authentication protocol pseudorandom sequence generator stream cipher
2009/6/5
In this paper, we introduce a new class of PRSGs, called par-
titioned pseudorandom sequence generators(PPRSGs), and propose an
RFID authentication protocol using a PPRSG, called S-protocol. Since
...
Provably Secure Ubiquitous Systems:Universally Composable RFID Authentication Protocols
Secure Ubiquitous Systems RFID Authentication Protocols
2008/11/13
This paper examines two unlinkably anonymous,
simple RFID identification protocols that require only
the ability to evaluate hash functions and generate
random values, and that are provably secure ...