2015
DOI: 10.14257/ijsia.2015.9.1.04
|View full text |Cite
|
Sign up to set email alerts
|

A High-security RFID Grouping Proof Protocol

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(3 citation statements)
references
References 14 publications
0
3
0
Order By: Relevance
“…Huang and Mu [16] proposed a grouping-proof protocol that introduced a new method of the key distribution. e protocol only utilizes some lightweight functions (not hash function) to generate the sessions so as to reduce the computing cost of tags.…”
Section: Some Typical Rfid Grouping-proof Protocolsmentioning
confidence: 99%
“…Huang and Mu [16] proposed a grouping-proof protocol that introduced a new method of the key distribution. e protocol only utilizes some lightweight functions (not hash function) to generate the sessions so as to reduce the computing cost of tags.…”
Section: Some Typical Rfid Grouping-proof Protocolsmentioning
confidence: 99%
“…Dinu et al [112] have developed a security framework using block encryption process on real-time ARM processor to testify its effectiveness on IoT applications. Huang and Mu et al [113] have developed a secure protocol to safeguard RFID-based communication in IoT. The focus of the study was to mitigate forged tag and reader attack, tracking attack, and desynchronization attack using a new distribution of secret key mechanism in cryptography.…”
Section: ) Studies On Bandwidth Issuementioning
confidence: 99%
“…Ping Huang and Haibing Mu [14] proposed a high-security RFID grouping-proof protocol. Their protocol introduces a new method of the key distribution by means of distributing the points on straight lines to different entities.…”
Section: The Related Grouping-proof Protocols For Rfid Systemsmentioning
confidence: 99%