[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Ha et al., 2007 - Google Patents

Security analysis and enhancement of one-way hash based low-cost authentication protocol (OHLCAP)

Ha et al., 2007

View PDF
Document ID
8215329965741870032
Author
Ha J
Moon S
Gonzalez Nieto J
Boyd C
Publication year
Publication venue
Emerging Technologies in Knowledge Discovery and Data Mining: PAKDD 2007 International Workshops Nanjing, China, May 22-25, 2007 Revised Selected Papers 11

External Links

Snippet

Choi et al. recently proposed an efficient RFID authentication protocol for a ubiquitous computing environment, OHLCAP (One-Way Hash based Low-Cost Authentication Protocol). However, this paper reveals that the protocol has several security weaknesses: 1) …
Continue reading at eprints.qut.edu.au (PDF) (other versions)

Classifications

    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L2209/00Additional information or applications relating to cryptographic mechanisms or cryptographic arrangements for secret or secure communication H04L9/00
    • H04L2209/80Wireless
    • H04L2209/805Lightweight hardware, e.g. radio-frequency identification [RFID] or sensor
    • HELECTRICITY
    • H04ELECTRIC COMMUNICATION TECHNIQUE
    • H04LTRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
    • H04L63/00Network architectures or network communication protocols for network security
    • H04L63/14Network architectures or network communication protocols for network security for detecting or protecting against malicious traffic
    • H04L63/1441Countermeasures against malicious traffic
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/30Authentication, i.e. establishing the identity or authorisation of security principals
    • G06F21/31User authentication
    • G06F21/34User authentication involving the use of external additional devices, e.g. dongles or smart cards

Similar Documents

Publication Publication Date Title
Peris-Lopez et al. Advances in ultralightweight cryptography for low-cost RFID tags: Gossamer protocol
Rhee et al. Challenge-response based RFID authentication protocol for distributed database environment
Chien SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity
Lo et al. An efficient mutual authentication scheme for EPCglobal class-1 generation-2 RFID system
Liu et al. A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography.
Ha et al. Low-cost and strong-security RFID authentication protocol
Erguler et al. Scalability and security conflict for RFID authentication protocols
Morshed et al. An efficient and secure authentication protocol for RFID systems
Kim et al. Symmetric encryption in RFID authentication protocol for strong location privacy and forward-security
Ha et al. Security analysis and enhancement of one-way hash based low-cost authentication protocol (OHLCAP)
Yang Lightweight authentication protocol for mobile RFID networks
Sadighian et al. Afmap: Anonymous forward-secure mutual authentication protocols for rfid systems
Akgün et al. Vulnerabilities of RFID security protocol based on chaotic maps
Morshed et al. Secure ubiquitous authentication protocols for RFID systems
Peris-Lopez et al. Lightweight cryptography for low-cost RFID tags
Morshed et al. Efficient mutual authentication protocol for radiofrequency identification systems
Liu An efficient RFID authentication protocol for low-cost tags
Mubarak et al. Mutual attestation using TPM for trusted RFID protocol
Chamekh et al. Security of RFID based Internet of Things applications: Requirements and open issues
Habibi et al. Cryptanalysis and improvement on a new RFID mutual authentication protocol compatible with EPC standard
Seo et al. Secure RFID authentication scheme for EPC class Gen2
Erguler et al. A salient missing link in rfid security protocols
Lei et al. A one-way Hash based low-cost authentication protocol with forward security in RFID system
Abughazalah et al. A mutual authentication protocol for low-cost rfid tags formally verified using casperfdr and avispa
Sundaresan et al. A secure search protocol based on Quadratic Residues for EPC Class-1 Gen-2 UHF RFID tags