Back to Results
First PageMeta Content
Ubiquitous computing / Wireless / N1 road / XTR / Technology / Telecommunications engineering / Finite fields / Automatic identification and data capture / Radio-frequency identification


Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Wang Shao-hui1,2,3, Han Zhijie1,2, Liu Sujuan1,2, Chen Dan-wei1,2 {1.College of Computer, Nanjing University of Posts and Telecommunications
Add to Reading List

Document Date: 2012-06-09 07:48:21


Open Document

File Size: 167,43 KB

Share Result on Facebook

City

New Delhi / Nanjing / Vienna / /

Company

National Natural Science Funds / Wireless Sensor Networks / Jiangsu High Technology Research Key Laboratory / Data Security Key Laboratory / /

Country

Austria / China / India / /

Event

FDA Phase / /

Facility

College of Computer / Nanjing University of Posts / Data Security Key Laboratory of Sichuan Province / Nanjing University of Post / /

IndustryTerm

real lightweight mutual authentication protocol / ultralightweight protocol / authentication protocol / lightweight mutual authentication protocol / minimalist mutualauthentication protocol / ultralightweight authentication protocol / wireless transmissions / ultralightweight authentication protocols / authenticaion protocol / ultralightweight protocols / lightweight mutual authentication protocols / warehouse management / proposed protocol / ultralightweight mutual authentication protocols / lightweight challenge response authentication algorithms / rfid systems / forward-secure mutual authentication protocols / authentication protocols / railroad car tracking / /

OperatingSystem

DoS / /

Organization

College of Computer / Nanjing University / Ubiquitous Intelligence / /

Person

E. Bertino / Wang Shao / Ai / Chen Dan / T. Cao / Yun Tian / H. Lei / /

Position

Cao / /

Product

RFID Tags / M2AP / /

ProvinceOrState

Oregon / Sichuan Province / /

PublishedMedium

IEEE Communications Letters / /

Technology

following algorithm / real lightweight mutual authentication protocol / Lightweight authentication protocols / Anonymous forward-secure mutual authentication protocols / 2 algorithm / lightweight mutual authentication protocols / M2AP Mutual Authentication Protocol / secret key / lightweight challenge response authentication algorithms / ultralightweight protocol / ultralightweight RFID authenticaion protocol / Cryptography / minimalist mutualauthentication protocol / authentication protocols / ultralightweight authentication protocols / RFID authentication protocols / ultralightweight authentication protocol / ultralightweight protocols / lightweight mutual authentication protocol / two ultra-lightweight RFID authentication protocols / Gossamer protocol / Radio Frequency / ultralightweight mutual authentication protocols / ultralightweight RFID authentication protocol / RFID technology / ultralightweight RFID authentication protocols / SASI protocol / /

SocialTag