Security Enhancing of Authentication Protocol for Hash Based RFID Tag
Jin-Oh Jeon, Min-Sup Kang, Journal of Internet Computing and Services, Vol. 11, No. 4, pp. 23-32, Aug. 2010
Full Text:
Keywords: three-way authentication protocol, SHA-1 hash algorithm, RFID Tag, three-way challenge response, ISO/IEC 1800-3 standard, Digital Codec design
Abstract
Statistics
Show / Hide Statistics
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Past 3 Years)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
|
Cite this article
[APA Style]
Jeon, J. & Kang, M. (2010). Security Enhancing of Authentication Protocol for Hash Based RFID Tag. Journal of Internet Computing and Services, 11(4), 23-32.
[IEEE Style]
J. Jeon and M. Kang, "Security Enhancing of Authentication Protocol for Hash Based RFID Tag," Journal of Internet Computing and Services, vol. 11, no. 4, pp. 23-32, 2010.
[ACM Style]
Jin-Oh Jeon and Min-Sup Kang. 2010. Security Enhancing of Authentication Protocol for Hash Based RFID Tag. Journal of Internet Computing and Services, 11, 4, (2010), 23-32.

