TY - GEN
T1 - Discussion of chaos algorithm apply in RFID authentication protocol
AU - Li, Heng
AU - Gao, Fei
AU - Xue, Yanming
AU - Feng, Shuo
PY - 2009
Y1 - 2009
N2 - Enhancement and promotion of RFID technology, making RFID a growing range of application areas, for cost and technical considerations, the current RFID system, the security ofinformation transmitted under consideration, for people to develop a variety of authentication protocol, for information security to a certain extent improved However, the current authentication protocols are still some gaps, so we are considering the introduction of the existing authentication protocol chaotic algorithm, the plaintext information transmitted encrypted, thus increasing the RFID system's information security.
AB - Enhancement and promotion of RFID technology, making RFID a growing range of application areas, for cost and technical considerations, the current RFID system, the security ofinformation transmitted under consideration, for people to develop a variety of authentication protocol, for information security to a certain extent improved However, the current authentication protocols are still some gaps, so we are considering the introduction of the existing authentication protocol chaotic algorithm, the plaintext information transmitted encrypted, thus increasing the RFID system's information security.
KW - Authentication protocol
KW - Chaos algorithm
KW - RFID
KW - Security
UR - http://www.scopus.com/inward/record.url?scp=77950491692&partnerID=8YFLogxK
U2 - 10.1109/ICCCS.2009.22
DO - 10.1109/ICCCS.2009.22
M3 - Conference contribution
AN - SCOPUS:77950491692
SN - 9780769539065
T3 - International Conference on Computer and Communications Security, ICCCS 2009
SP - 123
EP - 126
BT - International Conference on Computer and Communications Security, ICCCS 2009
T2 - International Conference on Computer and Communications Security, ICCCS 2009
Y2 - 5 December 2009 through 6 December 2009
ER -