Cited 64 time in
Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol
| DC Field | Value | Language |
|---|---|---|
| dc.contributor.author | Cho, Jung-Sik | - |
| dc.contributor.author | Jeong, Young-Sik | - |
| dc.contributor.author | Park, Sang Oh | - |
| dc.date.accessioned | 2024-08-08T08:00:40Z | - |
| dc.date.available | 2024-08-08T08:00:40Z | - |
| dc.date.issued | 2015-01 | - |
| dc.identifier.issn | 0898-1221 | - |
| dc.identifier.issn | 1873-7668 | - |
| dc.identifier.uri | https://scholarworks.dongguk.edu/handle/sw.dongguk/19919 | - |
| dc.description.abstract | A radio-frequency identification (RFID) system is a promising automatic identification technology that uses communication via radio waves to identify and track moving objects. RFID systems are expected to replace bar-code systems in object identification fields in the future, but various security problems are obstructing their diffusion. The most important problem of RFID system is that an attacker can access the tag information, which raises privacy infringement and forgery problems. This paper proposes a hash-based RFID tag mutual authentication protocol to solve these security problems of RFID systems. The proposed protocol is designed to demand high cost of acquiring the tag information for attackers. © 2012 Elsevier Ltd. | - |
| dc.format.extent | 8 | - |
| dc.language | 영어 | - |
| dc.language.iso | ENG | - |
| dc.publisher | Elsevier Ltd | - |
| dc.title | Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol | - |
| dc.type | Article | - |
| dc.publisher.location | 영국 | - |
| dc.identifier.doi | 10.1016/j.camwa.2012.02.025 | - |
| dc.identifier.scopusid | 2-s2.0-84919847483 | - |
| dc.identifier.bibliographicCitation | Computers and Mathematics with Applications, v.69, no.1, pp 58 - 65 | - |
| dc.citation.title | Computers and Mathematics with Applications | - |
| dc.citation.volume | 69 | - |
| dc.citation.number | 1 | - |
| dc.citation.startPage | 58 | - |
| dc.citation.endPage | 65 | - |
| dc.type.docType | Article | - |
| dc.description.isOpenAccess | Y | - |
| dc.description.journalRegisteredClass | sci | - |
| dc.description.journalRegisteredClass | scie | - |
| dc.description.journalRegisteredClass | scopus | - |
| dc.subject.keywordAuthor | Hash | - |
| dc.subject.keywordAuthor | Mutual authentication | - |
| dc.subject.keywordAuthor | RFID | - |
Items in ScholarWorks are protected by copyright, with all rights reserved, unless otherwise indicated.
30, Pildong-ro 1-gil, Jung-gu, Seoul, 04620, Republic of Korea+82-2-2260-3114
Copyright(c) 2023 DONGGUK UNIVERSITY. ALL RIGHTS RESERVED.
Certain data included herein are derived from the © Web of Science of Clarivate Analytics. All rights reserved.
You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.
