Inductive Method for Evaluating RFID Security Protocols
Authentication protocol verification is a difficult problem. The problem of “state space explosion” has always been inevitable in the field of verification. Using inductive characteristics, we combine mathematical induction and model detection technology to solve the problem of “state space explosio...
Main Authors: | Defu Liu, Guowu Yang, Yong Huang, Jinzhao Wu |
---|---|
Format: | Article |
Language: | English |
Published: |
Hindawi-Wiley
2019-01-01
|
Series: | Wireless Communications and Mobile Computing |
Online Access: | http://dx.doi.org/10.1155/2019/2138468 |
Similar Items
-
Ultralightweight RFID Security Protocol
by: Chia-Sheng Wu, et al.
Published: (2010) -
Improving the security of an RFID delegation protocol
by: Chien-Cheng Huang, et al.
Published: (2012) -
RFID Security Protocols with Privacy Protection
by: 吳建宏
Published: (2009) -
An Improved Two-Way Security Authentication Protocol for RFID System
by: Baolong Liu, et al.
Published: (2018-04-01) -
An Efficiency and Security Improvement to RFID Access Control Protocol
by: Ming-Szu Huang, et al.
Published: (2011)