Research on a provable security RFID authentication protocol based on Hash function

来源 :中国邮电高校学报(英文版) | 被引量 : 0次 | 上传用户:tonze5082
下载到本地 , 更方便阅读
声明 : 本文档内容版权归属内容提供方 , 如果您对本文有版权争议 , 可与客服联系进行内容授权或下架
论文部分内容阅读
其他文献
Area-efficient design methodology is proposed for the analog decoding implementations of the rate-1/2 accumulate repeat-4 jagged-accumulate (AR4JA) low density parity check (LDPC) code.The proposed approach is designed using optimized decoding architectur
Due to the difficulty of deploying Internet protocol (IP) multicast on the Internet on a large scale,overlay multicast has been considered as a promising alternative to develop the multicast communication in recent years.However,the existing overlay multi
Owing to the unreliability of wireless link and the resource constraints of embedded devices in terms of energy,processing power,and memory size in low power and lossy networks (LLNs),network congestion may occur in an emergency and lead to significant pa
Anomaly detection in smart grid is critical to enhance the reliability of power systems.Excessive manpower has to be involved in analyzing the measurement data collected from intelligent motoring devices while performance of anomaly detection is still not
Novel high power supply rejection ratio (PSRR) high-order temperature-compensated subthreshold metal-oxidesemiconductor (MOS) bandgap reference (BGR) is proposed in Semiconductor Manufacturing International Corporation (SMIC) 0.13 μm complementary MOS (CM
The popularity of IEEE 802.11 based wireless local area network (WLAN) increased significantly in recent years and resulted in the dense deployment of WLANs.While densification can contribute to increasing coverage,it could also lead to increasing interfe
Cloud download service,as a new application which downloads the requested content offiine and reserves it in cloud storage until users retrieve it,has recently become a trend attracting millions of users in China.In the face of the dilemma between the gro
Rough set theory is an important tool to solve uncertain problems.Attribute reduction,as one of the core issues of rough set theory,has been proven to be an effective method for knowledge acquisition.Most of heuristic attribute reduction algorithms usuall