A Study of Counter Inconsistency Problems in RFID Authentication Protocols
碩士 === 亞洲大學 === 資訊科學與應用學系碩士班 === 97 === Radio Frequency Identification (RFID) has been widely used in several applications and its security has become a critical issue in this field. So far, several secure schemes have been proposed to authenticate the legitimate reader and tag. However, in these sc...
Main Authors: | Ju-Pei Pai, 白如珮 |
---|---|
Other Authors: | Shyh-Chang Tsaur |
Format: | Others |
Language: | en_US |
Published: |
2009
|
Online Access: | http://ndltd.ncl.edu.tw/handle/41137326448579384819 |
Similar Items
-
Chaos Based RFID Authentication Protocol
by: Chung, Harold
Published: (2013) -
Group Tags Authentication Protocols For RFID
by: Chun-Chang Pan, et al.
Published: (2007) -
Chaos Based RFID Authentication Protocol
by: Chung, Harold
Published: (2013) -
An Enhanced Authentication Protocol for RFID Systems
by: Mehdi Hosseinzadeh, et al.
Published: (2020-01-01) -
Authentication Test-Based the RFID Authentication Protocol with Security Analysis
by: Minghui Wang, et al.
Published: (2014-08-01)