Now showing items 1-5 of 5

  • Colluding Tags Attack on the ECC-based Grouping Proofs for Rfids 

    Abyaneh, Mohammad Reza Sohizadeh (The author, 2012)
    Recently, a new privacy-preserving elliptic curve based grouping proof protocol with colluding tag prevention( CTP) has been proposed. The CTP protocol is claimed to be resistant against colluding tags attacks in which ...
  • On the Privacy of Two Tag Ownership Transfer Protocols for RFIDs 

    Abyaneh, Mohammad Reza Sohizadeh (The author, 2012)
    In this paper, the privacy of two recent RFID tag ownership transfer protocols are investigated against the tag owners as adversaries. The first protocol called ROTIV is a scheme which provides a privacy-preserving ...
  • On the Security of Non-Linear HB (NLHB) Protocol Against Passive Attack 

    Abyaneh, Mohammad Reza Sohizadeh (The author, 2012)
    As a variant of the HB authentication protocol for RFID systems, which relies on the complexity of decoding linear codes against passive attacks, Madhavan et al. presented Non-Linear HB(NLHB) protocol. In contrast to ...
  • Passive Cryptanalysis of the UnConditionally Secure Authentication Protocol for RFID Systems 

    Abyaneh, Mohammad Reza Sohizadeh (The author, 2012)
    Recently, Alomair et al. proposed the first Un- Conditionally Secure mutual authentication protocol for lowcost RFID systems(UCS-RFID). The security of the UCSRFID relies on five dynamic secret keys which are updated at ...
  • Security Analysis of two Distance-Bounding Protocols 

    Abyaneh, Mohammad Reza Sohizadeh (The author, 2012)
    In this paper, we analyze the security of two recently proposed distance bounding protocols called the “Hitomi” and the “NUS” protocols. Our results show that the claimed security of both protocols has been overestima ...