Serwis Infona wykorzystuje pliki cookies (ciasteczka). Są to wartości tekstowe, zapamiętywane przez przeglądarkę na urządzeniu użytkownika. Nasz serwis ma dostęp do tych wartości oraz wykorzystuje je do zapamiętania danych dotyczących użytkownika, takich jak np. ustawienia (typu widok ekranu, wybór języka interfejsu), zapamiętanie zalogowania. Korzystanie z serwisu Infona oznacza zgodę na zapis informacji i ich wykorzystanie dla celów korzytania z serwisu. Więcej informacji można znaleźć w Polityce prywatności oraz Regulaminie serwisu. Zamknięcie tego okienka potwierdza zapoznanie się z informacją o plikach cookies, akceptację polityki prywatności i regulaminu oraz sposobu wykorzystywania plików cookies w serwisie. Możesz zmienić ustawienia obsługi cookies w swojej przeglądarce.
With the development of wireless communication technology, the applications of Mobile ad hoc network (MANET) have been constantly expanded. However, MANET faces many security threats because of their own properties. Authentication is the fundamental service to protect the security of MANET, and in many applications users typically want personal information kept confidential, so that it required the...
Lightweight authentication protocols are necessary in the RFID system because tags are lack of computational resources and communication ability. Many researchers have proposed some authentication protocols which only use lightweight operations, such as XOR, hash operation and so on. In this paper, we analyze some authentication protocols. Especially, we analyze a forward secure RFID privacy protection...
Lightweight authentication protocols in the RFID system are necessary because the information security is important when messages are transmitted between the tag and reader. It has become one of the hottest issues in RFID system. Many researchers proposed some lightweight authentication protocols which only use lightweight operations, such as hash function, XOR operation and so on because the tags...
It is a great challenge for researchers to design a lightweight RFID protocol because tags lack sufficient computational resources, memory, power and communication ability. In this paper, we analyze two protocols respectively proposed by Choi et al and Ha et al and find the protocol proposed by Ha et al has security vulnerability. Afterwards, we propose an enhanced HGLAP and analyze its property....
As low-cost RFID tags with limited resource dominate in most of RFID applications, almost all security protocols used between the tag and reader are lightweight protocols which only need to implement some simple operations, such as hash function and XOR operation etc. In this paper, it is analyzed the security of different protocols based on the hash function. Afterwards, we find the A-SRAC protocol...
Lightweight authentication protocols are necessary in the RFID system because the tag lacks computational resources, memory, power and communication ability. This paper analyzes the security of different lightweight protocols in the HB protocol family and presents an active attack against the modified HB++ protocol proposed by Selwyn Piramuthu. According to this attack, the AUHB++ protocol is proposed...
Podaj zakres dat dla filtrowania wyświetlonych wyników. Możesz podać datę początkową, końcową lub obie daty. Daty możesz wpisać ręcznie lub wybrać za pomocą kalendarza.