Security Enhancing of Authentication Protocol for Hash Based RFID Tag
Jin-Oh Jeon, Min-Sup Kang, Journal of Internet Computing and Services, Vol. 11, No. 4, pp. 23-32, Aug. 2010
Full Text:
Keywords: three-way authentication protocol, SHA-1 hash algorithm, RFID Tag, three-way challenge response, ISO/IEC 1800-3 standard, Digital Codec design
Abstract
Statistics
Show / Hide Statistics
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
Statistics (Cumulative Counts from November 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[APA Style]
Jeon, J. & Kang, M. (2010). Security Enhancing of Authentication Protocol for Hash Based RFID Tag. Journal of Internet Computing and Services, 11(4), 23-32.
[IEEE Style]
J. Jeon and M. Kang, "Security Enhancing of Authentication Protocol for Hash Based RFID Tag," Journal of Internet Computing and Services, vol. 11, no. 4, pp. 23-32, 2010.
[ACM Style]
Jin-Oh Jeon and Min-Sup Kang. 2010. Security Enhancing of Authentication Protocol for Hash Based RFID Tag. Journal of Internet Computing and Services, 11, 4, (2010), 23-32.