Syamsuddin, Irfan (2008) A Survey of RFID Authentication Protocols Based on Hash-Chain Method. In: Third 2008 International Conference on Convergence and Hybrid Information Technology.
Text (Paper International Conference)
C016_ORIGINAL PAPER Irfan_RFID_IEEE_ICCIT_2008.pdf - Published Version
Download (281kB)
C016_ORIGINAL PAPER Irfan_RFID_IEEE_ICCIT_2008.pdf - Published Version
Download (281kB)
Text (Similarity Check)
C016_SIMILARITY CHECK Irfan_RFID_IEEE_ICCIT_2008.pdf - Supplemental Material
Download (2MB)
C016_SIMILARITY CHECK Irfan_RFID_IEEE_ICCIT_2008.pdf - Supplemental Material
Download (2MB)
Abstract
Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication. Although the protocols able to provide specific solution for RFID security and privacy problems, they fail to provide integrated solution. This article is a survey to closely observe those protocols in terms of its focus and limitations.
Item Type: | Conference or Workshop Item (Paper) |
---|---|
Subjects: | Q Science > QA Mathematics > QA75 Electronic computers. Computer science |
Divisions: | Jurusan Teknik Elektro > D4 Teknik Komputer dan Jaringan |
Depositing User: | Unnamed user with username 197312202000031008 |
Date Deposited: | 03 Apr 2023 17:17 |
Last Modified: | 03 Apr 2023 17:17 |
URI: | https://repository.poliupg.ac.id/id/eprint/219 |