22nd International Conference on Advanced Information Networking and Applications - Workshops (Aina Workshops 2008) 2008
DOI: 10.1109/waina.2008.204
|View full text |Cite
|
Sign up to set email alerts
|

Enhanced Yoking Proof Protocols for RFID Tags and Tag Groups

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
19
0

Year Published

2010
2010
2018
2018

Publication Types

Select...
4
2
2

Relationship

0
8

Authors

Journals

citations
Cited by 31 publications
(20 citation statements)
references
References 5 publications
0
19
0
Order By: Relevance
“…Then, the right side of Equation (18) can be simplified to x(T n )k t 1 P · x(T n ) −1 = k t 1 P. Therefore, the Equation (18) is proved.…”
Section: Proof Of the Correctness About Reader Verifymentioning
confidence: 94%
See 2 more Smart Citations
“…Then, the right side of Equation (18) can be simplified to x(T n )k t 1 P · x(T n ) −1 = k t 1 P. Therefore, the Equation (18) is proved.…”
Section: Proof Of the Correctness About Reader Verifymentioning
confidence: 94%
“…framework [23]. Cho et al [18] described a grouping-proof protocol resisted replay attack. In [24], the authors used the code scheme to check the tag information and improve the protocol security.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…A c c e p t e d m a n u s c r i p t Cho et al (2008) proposed a variant of Piramithu's protocol to make it immune to brute force attacks. However, it turns out to be vulnerable to multi-proof session replay attacks.…”
Section: Related Workmentioning
confidence: 99%
“…Later, Peris-Lopez, Orfila, HernandezCastro and Lubbe [17] showed that the protocol is vulnerable to impersonation attacks. Some other protocols based on symmetric-key cryptography were proposed in [15,7,6,11,5]. However they all suffer impersonation attacks and/or anonymity attacks as illustrated in [17].…”
Section: Introductionmentioning
confidence: 99%