搜索结果: 1-6 共查到“军队指挥学 RFID protocols”相关记录6条 . 查询时间(0.093 秒)
On Designing Lightweight RFID Protocols for Medical IoT
RFID Authentication Ultralightweight
2019/7/23
Recently, in IEEE Transactions on Industrial Informatics, Fan et al. proposed a lightweight RFID protocol which has been suggested to be employed for protecting the Medical Privacy in an IoT system. H...
On the Security of Recently Proposed RFID Protocols
authentication protocols de-synchronization attacks
2014/3/5
RFID authentication protocols should have a secret updating phase in order to protect the privacy of RFID tags against tag tracing attacks. In the literature, there are many lightweight RFID authentic...
A Formal Approach to Distance-Bounding RFID Protocols
foundations / RFID distance-bounding protocols formal models provable security
2012/3/27
Distance-Bounding identification protocols aim at impeding man-in-the-middle attacks by measuring response times. There are three kinds of attacks such protocols could address: (1) Mafia attacks where...
A Formal Approach to Distance-Bounding RFID Protocols
foundations / RFID distance-bounding protocols formal models provable security
2012/3/27
Distance-Bounding identification protocols aim at impeding man-in-the-middle attacks by measuring response times. There are three kinds of attacks such protocols could address: (1) Mafia attacks where...
Untraceable RFID protocols are not trivially composable:Attacks on the revision of EC-RAC
Untraceable RFID protocols Attacks EC-RAC
2009/7/14
It is well-known that protocols that satisfy a security prop-
erty when executed in isolation do not necessarily satisfy the same se-
curity property when they are executed in an environment contain...
This document consists of a collection of attacks upon RFID protocols
and is meant to serve as a quick and easy reference. This document will be
updated as new attacks are found. Currently the only ...