<--- Back to Details
First PageDocument Content
Radio-frequency identification / Wireless / Needham–Schroeder protocol / IP / Public-key cryptography / Cryptographic hash function / Cryptography / Cryptographic protocols / Automatic identification and data capture
Date: 2014-08-10 19:38:24
Radio-frequency identification
Wireless
Needham–Schroeder protocol
IP
Public-key cryptography
Cryptographic hash function
Cryptography
Cryptographic protocols
Automatic identification and data capture

A Light-weight Security Protocol for RFID System.

Add to Reading List

Source URL: dl.ifip.org

Download Document from Source Website

File Size: 285,30 KB

Share Document on Facebook

Similar Documents

Computing / Communications protocol / Yahalom / Needham–Schroeder protocol / Cryptographic protocols / Data / Information

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

DocID: 1fvy3 - View Document

2006 Paper 8 Question 7 Security The Needham–Schroeder protocol is defined as 1. A −→ S : A, B, NA 2. S −→ A : {NA , B, KAB , {KAB , A}KBS }KAS

DocID: 1eu5I - View Document

Cryptographic protocols / Needham–Schroeder protocol / Dropbox / Program refinement / Vulnerability / VisIt / Lottery / Computer security / Software / Computing / Computer network security

2014 IEEE Security and Privacy Workshops Combining Generated Data Models with Formal Invalidation for Insider Threat Analysis Christian W. Probst Technical University of Denmark

DocID: 1aEkw - View Document

Information / Reflection attack / Cryptographic nonce / Password authentication protocol / Public-key cryptography / Otway–Rees protocol / Needham–Schroeder protocol / Cryptography / Cryptographic protocols / Data

Dynamic Types for Authentication ∗ Michele Bugliesi Riccardo Focardi Matteo Maffei Dipartimento di Informatica, Università Ca’ Foscari di Venezia, Via Torino 155, IMestre (Ve), Italy

DocID: 18EJl - View Document

Needham–Schroeder protocol / Cryptographic nonce / Challenge-response authentication / RSA / Otway–Rees protocol / Cryptography / Cryptographic protocols / Public-key cryptography

Authenticity by Tagging and Typing ∗ Michele Bugliesi Riccardo Focardi Matteo Maffei Università Ca’Foscari di Venezia

DocID: 189F7 - View Document