ResearchBib Share Your Research, Maximize Your Social Impacts
Sign for Notice Everyday Sign up >> Login

Vulnerabilities and Improvements on HRAP+, a Hash-Based RFID Authentication Protocol

Journal: Advances in Computer Science : an International Journal(ACSIJ) (Vol.3, No. 6)

Publication Date:

Authors : ; ; ;

Page : 51-56

Keywords : RFID authentication protocols; HRAP+ protocol; Security; Impersonation Attack;

Source : Downloadexternal Find it from : Google Scholarexternal

Abstract

In the last decade, Radio Frequency Identification (RFID) systems are employed in many authentications and identifi-cations applications. In RFID systems, in order to provide secure authentication between RFID users, different au-thentication protocols pr ...

Last modified: 2014-12-01 19:37:50