您当前的位置:
首页 >
文章列表页 >
Edwards curves based security authentication protocol for mobile RFID systems
security protocol | 更新时间:2024-06-05
    • Edwards curves based security authentication protocol for mobile RFID systems

    • Journal on Communications   Vol. 35, Issue 11, Pages: 132-138(2014)
    • DOI:10.11959/j.issn.1000-436x.2014.11.015    

      CLC: TP309
    • Online First:2014-11

      Published:25 November 2014

    移动端阅览

  • Yu-long YANG, Chang-gen PENG, Zhou ZHOU, et al. Edwards curves based security authentication protocol for mobile RFID systems[J]. Journal on Communications, 2014, 35(11): 132-138. DOI: 10.11959/j.issn.1000-436x.2014.11.015.

  •  
  •  

0

Views

398

下载量

4

CSCD

Alert me when the article has been cited
提交
Tools
Download
Export Citation
Share
Add to favorites
Add to my album

Related Articles

Design of periodic deniable ring signcryption scheme based on SM9
Lightweight facial authentication scheme based on the SM4 algorithm for privacy protection
Selective aggregation scheme for multi-dimensional data with type-based verification
Identity privacy and security protection scheme for charitable donations based on group signatures
Privacy-preserving task matching scheme for crowdsourcing

Related Author

Zhang Yanshuo
Kong Jiayin
Zhou Xingyu
Xie Rongna
Qin Xiaohong
ZHANG Xucheng
XIONG Ling
LIU Zhicai

Related Institution

Department of Cryptology Science and Technology, Beijing Electronic Science & Technology Institute
School of Computer and Software Engineering, Xihua University
School of Information Science, Beijing Language and Culture University
School of Computer Science and Technology, Guizhou University
State Key Laboratory of Public Big Data, Ministry of Education
0