搜索结果: 1-5 共查到“军事学 compliant”相关记录5条 . 查询时间(0.015 秒)
HMAKE: Legacy-Compliant Multi-factor Authenticated Key Exchange from Historical Data
Historical Data Authentication Authenticated Key Exchange
2019/5/9
In this paper, we introduce two lightweight historical data based multi-factor authenticated key exchange (HMAKE) protocols in the random oracle model. Our HMAKE protocols use a symmetric secret key, ...
For an EPC-C1 G2 RFID compliant Protocol, CRC with Concatenation : No; PRNG with Concatenation : Yes
RFID Mutual Authentication
2014/3/11
In this paper we present new constraints to EPCglobal Class 1 Generation 2 (EPC-C1 G2) standard which if they have been considered in the design of EPC-C1 G2 complaint authentication protocols, lead t...
Cryptanalysis of AZUMI: an EPC Class-1 Generation-2 Standard Compliant RFID Authentication Protocol
cryptographi protocols/ RFID EPC-C1 G2 Mutual Authentication Secret Disclosure Tag Impersonation.
2012/3/27
In this paper, we analyze the security of AZUMI protocol which is compliant with the EPC-Class-1 Generation-2 standard and recently has been proposed by Peris \textit{et al.} This protocol is an impro...
Cryptanalysis of improved Yeh \textit{et al. }'s authentication Protocol: An EPC Class-1 Generation-2 standard compliant protocol
cryptographic protocols / RFID C-C1 G2 Mutual Authentication Secret Disclosure Tag/Reader Impersonation Traceability
2012/3/27
EPC class 1 Generation 2(or in short term EPC-C1 G2) is one of the most important standards for RFID passive tags. However, the original protocol known to be insecure. To improve the security of this ...
Secure EPC Gen2 compliant Radio Frequency Identification
EPCGen2 compliance security identification
2009/6/12
The increased functionality of EPC Class1 Gen2 (EPCGen2)
is making this standard a de facto specification for inexpensive tags in
the RFID industry. Recently three EPCGen2 compliant protocols that
...