Traceable Privacy of Recent Provably-Secure RFID Protocols
From MaRDI portal
Publication:3506416
DOI10.1007/978-3-540-68914-0_29zbMath1319.94094OpenAlexW1539609607MaRDI QIDQ3506416
Raphael C.-W. Phan, Khaled Ouafi
Publication date: 13 June 2008
Published in: Applied Cryptography and Network Security (Search for Journal in Brave)
Full work available at URL: https://dspace.lboro.ac.uk/2134/8157
Data encryption (aspects in computer science) (68P25) Authentication, digital signatures and secret sharing (94A62)
Related Items (2)
Addressing Flaws in RFID Authentication Protocols ⋮ Privacy-preserving authenticated key exchange for constrained devices
Cites Work
- Unnamed Item
- Unnamed Item
- Efficient signature generation by smart cards
- RFID Privacy Based on Public-Key Cryptography
- On Privacy Models for RFID
- Examining Indistinguishability-Based Proof Models for Key Establishment Protocols
- Errors in Computational Complexity Proofs for Protocols
- Cryptanalysis of Two Provably Secure Cross-Realm C2C-PAKE Protocols
- Advances in Computer Science - ASIAN 2004. Higher-Level Decision Making
- Information Security and Privacy
- Progress in Cryptology – Mycrypt 2005
- Security in Communication Networks
- Applied Cryptography and Network Security
This page was built for publication: Traceable Privacy of Recent Provably-Secure RFID Protocols