Journal of Computer and Communications

Vol.4 No.8(2016), Paper ID 67457, 9 pages

DOI:10.4236/jcc.2016.48001

 

The Vulnerability Analysis of Some Typical Hash-Based RFID Authentication Protocols

 

Zhicai Shi, Shitao Ren, Fei Wu, Changzhi Wang

 

School of Electronic & Electrical Engineering, Shanghai University of Engineering Science, Shanghai, China
School of Electronic & Electrical Engineering, Shanghai University of Engineering Science, Shanghai, China
School of Electronic & Electrical Engineering, Shanghai University of Engineering Science, Shanghai, China
School of Electronic & Electrical Engineering, Shanghai University of Engineering Science, Shanghai, China

 

Copyright © 2016 Zhicai Shi, Shitao Ren, Fei Wu, Changzhi Wang et al. This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

 

How to Cite this Article


Shi, Z. , Ren, S. , Wu, F. and Wang, C. (2016) The Vulnerability Analysis of Some Typical Hash-Based RFID Authentication Protocols. Journal of Computer and Communications, 4, 1-9. doi: 10.4236/jcc.2016.48001.

Copyright © 2024 by authors and Scientific Research Publishing Inc.

Creative Commons License

This work and the related PDF file are licensed under a Creative Commons Attribution 4.0 International License.