Proceedings of the 2018 International Conference on Data Science and Information Technology 2018
DOI: 10.1145/3239283.3239300
|View full text |Cite
|
Sign up to set email alerts
|

Comment on "cryptanalysis of a novel ultralightweight mutual authentication protocol for IoT devices using RFID tags"

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2021
2021
2024
2024

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 8 publications
0
1
0
Order By: Relevance
“…[14] proposed a XOR and Rotation operations based protocol. However, some researchers such as [15,5,16] demonstrated that their protocol is weak and vulnerable to secret disclosure and de-synchronization attacks. In addition, [15] suggested a modified version of [14] scheme, but [17] reveals that [15]'s scheme suffers from secret disclosure for instance.…”
Section: Related Workmentioning
confidence: 99%
“…[14] proposed a XOR and Rotation operations based protocol. However, some researchers such as [15,5,16] demonstrated that their protocol is weak and vulnerable to secret disclosure and de-synchronization attacks. In addition, [15] suggested a modified version of [14] scheme, but [17] reveals that [15]'s scheme suffers from secret disclosure for instance.…”
Section: Related Workmentioning
confidence: 99%