搜索结果: 1-8 共查到“军事学 EPC”相关记录8条 . 查询时间(0.078 秒)
Game-Based Cryptanalysis of a Lightweight CRC-Based Authentication Protocol for EPC Tags
Internet of things RFID authentication protocols Security and privacy
2016/4/21
The term "Internet of Things (IoT)" expresses a huge network of smart and connected objects which can interact with other devices without our interposition. Radio frequency identification (RFID) is a ...
Traceability Improvements of a New RFID Protocol Based On EPC C1G2
RFID authentication protocols Yu-Jehn protocol Privacy
2015/12/23
Radio Frequency Identification (RFID) applications have spread all over the world and, in order to provide their security and pri-vacy, researchers proposed different kind of protocols. In this pa-per...
Analysis of an RFID Authentication Protocol in Accordance with EPC Standards
Security and Privacy RFID Authentication protocols
2015/12/22
In the past few years, the design of RFID authentication protocols in accordance with the EPC Class-1
Generation-2 (EPC C1 G2) standards, has been one of the most important challenges in the informat...
For an EPC-C1 G2 RFID compliant Protocol, CRC with Concatenation : No; PRNG with Concatenation : Yes
RFID Mutual Authentication
2014/3/11
In this paper we present new constraints to EPCglobal Class 1 Generation 2 (EPC-C1 G2) standard which if they have been considered in the design of EPC-C1 G2 complaint authentication protocols, lead t...
Analysis and Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard
RFID authentication protocol EPC Forward secrecy integrity
2013/4/19
Radio Frequency IDentification (RFID) technology is a wireless identification method in which security and privacy are important parameters for public acceptance and widespread use. In order to thwart...
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
cryptographi protocols/ RFID EPC-C1 G2 Mutual Authentication Secret Disclosure Tag Impersonation.
2012/3/27
In this paper, we analyze the security of AZUMI protocol which is compliant with the EPC-Class-1 Generation-2 standard and recently has been proposed by Peris \textit{et al.} This protocol is an impro...
Cryptanalysis of improved Yeh \textit{et al. }'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol
cryptographic protocols / RFID C-C1 G2 Mutual Authentication Secret Disclosure Tag/Reader Impersonation Traceability
2012/3/27
EPC class 1 Generation 2(or in short term EPC-C1 G2) is one of the most important standards for RFID passive tags. However, the original protocol known to be insecure. To improve the security of this ...
Secure EPC Gen2 compliant Radio Frequency Identification
EPCGen2 compliance security identification
2009/6/12
The increased functionality of EPC Class1 Gen2 (EPCGen2)
is making this standard a de facto specification for inexpensive tags in
the RFID industry. Recently three EPCGen2 compliant protocols that
...