Sciweavers

31 search results - page 1 / 7
» Cryptanalysis of Two Lightweight RFID Authentication Schemes
Sort
View
PERCOM
2007
ACM
14 years 10 months ago
Cryptanalysis of Two Lightweight RFID Authentication Schemes
Benessa Defend, Kevin Fu, Ari Juels
JCM
2008
138views more  JCM 2008»
13 years 11 months ago
Cryptanalysis of Some RFID Authentication Protocols
Two effective attacks, namely de-synchronization attack and impersonation attack, against Ha et al. 's LCSS RFID authentication protocol, Song and Mitchell's protocol are...
Tianjie Cao, Peng Shen, Elisa Bertino
TDSC
2011
13 years 6 months ago
On the Security of Chien's Ultralightweight RFID Authentication Protocol
Recently, Chien proposed an ultralightweight RFID authentication protocol to prevent all possible attacks. However, we find two de-synchronization attacks to break the protocol. K...
Hung-Min Sun, Wei-Chih Ting, King-Hang Wang
SEC
2007
14 years 18 days ago
Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols
In this paper, we analyze the security vulnerabilities of two ultra-lightweight RFID mutual authentication protocols: LMAP and M2 AP, which are recently proposed by Peris-Lopez et ...
Tieyan Li, Guilin Wang
GLOBECOM
2007
IEEE
14 years 5 months ago
Addressing the Weakness in a Lightweight RFID Tag-Reader Mutual Authentication Scheme
— A lightweight radio frequency identification (RFID) tag-reader mutual authentication scheme was recently proposed as an improvement over the original authentication protocol s...
Tong-Lee Lim, Tieyan Li