摘要
The introduction of authentication protocols for RFID system provides the security to it, authentication protocol based on hash function is one of the most commonly used authentication protocol, which the hash function they used is a unilateral function, with a relatively high security, and it is easy to implement in the tag of RFID, so it has a wider application in RFID system. As the hash function, the characteristics of its own will have hash table conflicts, and thus would have resulted in security vulnerabilities, aim at the hash table conflict, this paper proposes a specific solution, and simulate the improved authentication protocol.
源语言 | 英语 |
---|---|
主期刊名 | Advances in Wireless Networks and Information Systems |
页 | 177-182 |
页数 | 6 |
DOI | |
出版状态 | 已出版 - 2010 |
活动 | 2009 International Conference on Wireless Networks and Information Systems, WNIS 2009 - Shanghai, 中国 期限: 28 12月 2009 → 29 12月 2009 |
出版系列
姓名 | Lecture Notes in Electrical Engineering |
---|---|
卷 | 72 LNEE |
ISSN(印刷版) | 1876-1100 |
ISSN(电子版) | 1876-1119 |
会议
会议 | 2009 International Conference on Wireless Networks and Information Systems, WNIS 2009 |
---|---|
国家/地区 | 中国 |
市 | Shanghai |
时期 | 28/12/09 → 29/12/09 |
指纹
探究 'Research of RFID authentication protocol based on hash function' 的科研主题。它们共同构成独一无二的指纹。引用此
Heng, L., Fei, G., Yanming, X., & Shuo, F. (2010). Research of RFID authentication protocol based on hash function. 在 Advances in Wireless Networks and Information Systems (页码 177-182). (Lecture Notes in Electrical Engineering; 卷 72 LNEE). https://doi.org/10.1007/978-3-642-14350-2_22