2009 IEEE International Conference on RFID 2009
DOI: 10.1109/rfid.2009.4911167
|View full text |Cite
|
Sign up to set email alerts
|

HB-MP<sup>++</sup> protocol: An ultra light-weight authentication protocol for RFID system

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2009
2009
2023
2023

Publication Types

Select...
4
2

Relationship

0
6

Authors

Journals

citations
Cited by 11 publications
(2 citation statements)
references
References 12 publications
0
2
0
Order By: Relevance
“…Yoon, Sukki, et al define customer perception as the psychological tradeoff of consumers, who usually calculate value as quality divided by price. They believe that a brand can increase customer perception by improving product quality and maintaining price, or reducing price and maintaining product quality [2]. Alwi, Sharifah Faridah Syed, et al found that product quality directly affects customers' brand perception, and thus affects the company's reputation.…”
Section: Study the Static Structure Characteristics Of Knowledge Onto...mentioning
confidence: 99%
“…Yoon, Sukki, et al define customer perception as the psychological tradeoff of consumers, who usually calculate value as quality divided by price. They believe that a brand can increase customer perception by improving product quality and maintaining price, or reducing price and maintaining product quality [2]. Alwi, Sharifah Faridah Syed, et al found that product quality directly affects customers' brand perception, and thus affects the company's reputation.…”
Section: Study the Static Structure Characteristics Of Knowledge Onto...mentioning
confidence: 99%
“…HB# (Gilbert et al , 2008b) was one of them claiming security against GRS attack, but a new form of man-in-the-middle attacks called OOV attack was presented by Oaufi et al that breaks not only HB# but also many of the HB-like schemes (Ouafi et al , 2008). Other protocols proposed were HB-MP+ (Xuefei et al , 2008) and HB-MP++ (Bongno et al , 2009), which were considered as an enhancement to the HB-MP, but the description of provided function in HB-MP+ was abstract and without any details, while HB-MP++ includes another kind of weakness mentioned later in this paper. Also, PUF-HB (Hammouri and Sunar, 2008) was another variant that uses a physical unclonable function but does not carry any proof of security against man-in-the-middle attacks.…”
Section: Introductionmentioning
confidence: 99%