2015
DOI: 10.1016/j.camwa.2012.02.025
|View full text |Cite
|
Sign up to set email alerts
|

Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
69
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
3
2
1

Relationship

0
6

Authors

Journals

citations
Cited by 64 publications
(69 citation statements)
references
References 10 publications
0
69
0
Order By: Relevance
“…[18]. Subsequently, some other schemes [12][13][14][15][16] based on the one-way hash function and exclusive-OR were proposed. However, they are also M A N U S C R I P T…”
Section: Related Workmentioning
confidence: 99%
See 4 more Smart Citations
“…[18]. Subsequently, some other schemes [12][13][14][15][16] based on the one-way hash function and exclusive-OR were proposed. However, they are also M A N U S C R I P T…”
Section: Related Workmentioning
confidence: 99%
“…In 2012, Cho et al proposed a hash-based mutual authentication protocol [16] and the authors claimed that their protocol addresses all the privacy [17][18][19] and forgery issues [20][21] [11][12][13][14][15][16] based on one-way hash function and exclusive-OR are impractical.…”
Section: Related Workmentioning
confidence: 99%
See 3 more Smart Citations