A Secure Elliptic Curve-Based RFID Protocol

来源 :计算机科学技术学报 | 被引量 : 0次 | 上传用户:wdc145
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores has increased.Nevertheless, some of these systems present privacy problems that may discourage potential users. Hence, high confidence and efficient privacy protocols are urgently needed. Previous studies in the literature proposed schemes that are proven to be secure, but they have scalability problems. A feasible and scalable protocol to guarantee privacy is presented in this paper.The proposed protocol uses elliptic curve cryptography combined with a zero knowledge-based authentication scheme. An analysis to prove the system secure, and even forward secure is also provided.
其他文献
Four coumarin derivatives(4a-4d) with different alkoxy chains were synthesized.It was found that compound 4d showed a better gelation ability than the other com
When building dependable systems by integrating untrusted software components that were not originally designed to interact with each other, it is likely the oc
At the present time, best rules and patterns have reached a zenith in popularity and diffusion, thanks to the software communitys efforts to discover, classify
Web services run in a highly dynamic environment, as a result, the QoS of which will change relatively frequently.In order to make the composite service adapt t
An experimental investigation on the properties of the near wake behind the rotor of a Horizontal-Axis Wind Turbine (HAWT) was carried out at model scale. Measu
Fiber reinforced polymer (FRP) composites are increasingly being used for the re-pair and strengthening of deteriorated concrete structural components through a
A novel Pd-catalyzed sequential reaction for the synthesis of fused tricyclic compounds with a dihydrofuran or isobenzofur-anone unit was developed.
Wireless sensor nodes have the advantage of being low-cost, easily deployed and of good mobility. If deployed in an underground mine with existing underground t
Composite membranes with polyvinyl alcohol (PVA),sulphonated poly ether ether ketone (SPEEK) and phosphotungstic acid (PWA) were prepared using solvent casting
A similar material model and a numerical simulation were constructed and are described herein. The deformation and failure of surrounding rock of broken and sof