Anonymous mutual authentication protocol for RFID tag without back-end database
Abstract. RFID, as an emerging technology, has very huge potential in today's social and business developments. Security and Privacy are one of the important issues in the design of practical RFID protocols. In this paper, we focus on RFID authentication protocol. RFID mutual authentication is...
| Main Authors: | Han, Song, Dillon, Tharam S., Chang, Elizabeth |
|---|---|
| Format: | Book Chapter |
| Published: |
Springer
2007
|
| Online Access: | http://hdl.handle.net/20.500.11937/14457 |
Similar Items
RFID mutual authentication protocols for tags and readers with and without a server
by: Han, Song, et al.
Published: (2013)
by: Han, Song, et al.
Published: (2013)
Mutual authentication protocol for RFID tags based on synchronised secret information with monitor
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
Mutual Authentication Protocol Model For Low-Cost RFID Systems Based On Shelled Random Value
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
A survey of RFID authentication protocols
by: Yousuf, Y., et al.
Published: (2008)
by: Yousuf, Y., et al.
Published: (2008)
A RFID Protocol For Detecting The Existence Of A Single RFID Tag By Two RFID Readers
by: Tan , Aik Theng
Published: (2012)
by: Tan , Aik Theng
Published: (2012)
HOOPOE: High performance and efficient anonymous handover authentication protocol for flying out of zone UAVs
by: Khalid, Haqi, et al.
Published: (2023)
by: Khalid, Haqi, et al.
Published: (2023)
Cryptanalysis of two anonymous buyer-seller watermarking protocols and an improvement for true anonymity
by: Goi, , BM, et al.
Published: (2004)
by: Goi, , BM, et al.
Published: (2004)
Practical fair anonymous undeniable signatures
by: Han, Song, et al.
Published: (2004)
by: Han, Song, et al.
Published: (2004)
Securing anonymous authenticated announcement protocol for group signature in internet of vehicle / Nur Afiqah Suzelan Amir
by: Nur Afiqah , Suzelan Amir
Published: (2021)
by: Nur Afiqah , Suzelan Amir
Published: (2021)
Tamper detection in RFID tags, using, fragile watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
Miniaturization of UHF RFID tag antenna
by: Daud, Nor Hidayah
Published: (2015)
by: Daud, Nor Hidayah
Published: (2015)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
A mutual-healing key distribution scheme in wireless sensor networks
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
A self-healing and mutual-healing key distribution scheme using bilinear pairings for wireless networks
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
A novel printed antenna for ultrawideband RFID (UWB-RFID) tag
by: Abdel-Raouf, Hany Essam Eldin, et al.
Published: (2010)
by: Abdel-Raouf, Hany Essam Eldin, et al.
Published: (2010)
Secure e-transactions protocol using intelligent mobile agents with fair privacy
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Linear microstrip resonator for UWB RFID tag
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2017)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2017)
Clone tag detection in distributed RFID systems
by: Kamaludin, Hazalila, et al.
Published: (2018)
by: Kamaludin, Hazalila, et al.
Published: (2018)
New RFID tags to replace faulty ones
by: New Straits Times
Published: (2022)
by: New Straits Times
Published: (2022)
Secure web services using two-way authentication and three-party key establishment for service delivery
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
Microstrip spiral resonator for the UWB chipless RFID tag
by: Hossain, A. K. M. Zakir, et al.
Published: (2014)
by: Hossain, A. K. M. Zakir, et al.
Published: (2014)
Microstrip spiral resonator for the UWB chipless RFID tag
by: Hossain, A. K. M. Z., et al.
Published: (2015)
by: Hossain, A. K. M. Z., et al.
Published: (2015)
Spatial signal attenuation model of active RFID tags
by: Xu, S., et al.
Published: (2017)
by: Xu, S., et al.
Published: (2017)
Spatial Signal Attenuation Model of Active RFID Tags
by: Xu, S., et al.
Published: (2018)
by: Xu, S., et al.
Published: (2018)
Design of multi-band passive RFID tag antenna
by: Yussuf, Abubeker A., et al.
Published: (2010)
by: Yussuf, Abubeker A., et al.
Published: (2010)
An authenticated self-healing key distribution scheme based on bilinear pairings
by: Tian, Biming, et al.
Published: (2009)
by: Tian, Biming, et al.
Published: (2009)
A critical analysis of RFID security protocols
by: Sharif, A., et al.
Published: (2008)
by: Sharif, A., et al.
Published: (2008)
Spiral resonator for ultra wide band chipless RFID tag
by: Hossain, Abul K. M. Zakir, et al.
Published: (2014)
by: Hossain, Abul K. M. Zakir, et al.
Published: (2014)
Tag for UWB Chipless RFID: a single antenna approach
by: Hossain, A. K. M. Zakir, et al.
Published: (2015)
by: Hossain, A. K. M. Zakir, et al.
Published: (2015)
Ethical issues pertaining to 'Student RFID Tag' / Norhamiza Yarani
by: Yarani, Norhamiza
Published: (2006)
by: Yarani, Norhamiza
Published: (2006)
An efficient approach to detecting missing tags in RFID data stream
by: Zainudin, Nur’Aifaa, et al.
Published: (2018)
by: Zainudin, Nur’Aifaa, et al.
Published: (2018)
A review on missing tags detection approaches in RFID system
by: Zainudin, Nur 'Aifaa, et al.
Published: (2018)
by: Zainudin, Nur 'Aifaa, et al.
Published: (2018)
Design of Compact Metal-Mountable Uhf RFID Tag Antenna
by: Tan, Jiun Ian
Published: (2021)
by: Tan, Jiun Ian
Published: (2021)
Design of small tag antenna for embedded RFID tracking system
by: Koh, Hao Zhe
Published: (2023)
by: Koh, Hao Zhe
Published: (2023)
Cryptanalysis of a generalized anonymous buyer-seller watermarking protocol of IWDW 2004
by: Goi, , BM, et al.
Published: (2005)
by: Goi, , BM, et al.
Published: (2005)
Cryptanalysis of two non-anonymous buyer-seller watermarking protocols for content protection
by: Goi, Bok Min, et al.
Published: (2007)
by: Goi, Bok Min, et al.
Published: (2007)
The worth of anonymous feedback
by: Dreher, Heinz, et al.
Published: (2006)
by: Dreher, Heinz, et al.
Published: (2006)
Design of a planar wideband patch antenna for UHF RFID tag
by: Bashri, Mohd Saiful Riza, et al.
Published: (2014)
by: Bashri, Mohd Saiful Riza, et al.
Published: (2014)
Similar Items
-
RFID mutual authentication protocols for tags and readers with and without a server
by: Han, Song, et al.
Published: (2013) -
Mutual authentication protocol for RFID tags based on synchronised secret information with monitor
by: Han, Song, et al.
Published: (2007) -
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007) -
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008) -
Mutual Authentication Protocol Model For Low-Cost RFID Systems Based On Shelled Random Value
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)