南華大學機構典藏系統:Item 987654321/22890
English  |  正體中文  |  简体中文  |  Items with full text/Total items : 18278/19583 (93%)
Visitors : 968454      Online Users : 606
RC Version 7.0 © Powered By DSPACE, MIT. Enhanced by NTU Library IR team.
Scope Tips:
  • please add "double quotation mark" for query phrases to get precise results
  • please goto advance search for comprehansive author search
  • Adv. Search
    HomeLoginUploadHelpAboutAdminister Goto mobile version
    Please use this identifier to cite or link to this item: http://nhuir.nhu.edu.tw/handle/987654321/22890


    Title: 基於同步化秘密資訊之新而有效率的RFID交互認證方案
    Other Titles: A New Efficient RFID Mutual Authentication Scheme based on Synchronized Secret Information
    Authors: 黃大明
    Huang, Ta-ming
    Contributors: 資訊管理學研究所
    周志賢
    Jue-sam Chou
    Keywords: 同步化秘密資訊;無線射頻辨識;Hash函數;認證;RFID標籤
    RFID Tag;Hash Function;Authentication;Synchronized Secret Information;RFID (Radio Frequency Identification)
    Date: 2007
    Issue Date: 2015-08-07 13:27:35 (UTC+8)
    Abstract:   在2006年Sangshin Lee、Tomoyuki Asano及Kwangjo Kim三人提出了 RFID Mutual Authentication Scheme based on Synchronized Secret Information [14],他們利用Hash函數以及公開同步化秘密資訊(Synchronized Secret Information )技術,宣稱可以達到保護使用者的隱私性,並且可以預防RFID標籤(Tag)被複製及仿造。    但是在同步化驗證過程後端資料庫(Back- end DataBase)卻必須要使用暴力破解法方式計算再搜尋確認無誤,以致於後端效率不佳尤其在大量確認標籤時更加明顯[14][15]。有鑑於此我們基於RFID同步化秘密資訊(Synchronized Secret Information )發展出一個更有效率的交互確認方案,我們的方案不只可達到同等的安全性且更加的有效率。
      In 2006, Sangshin Lee et.al, proposed a RFID MutualAuthentication Scheme based on Synchronized Secret Information [14].They claim their protocol can not only protect user privacy utilizing Hash function and synchronized secret information published schemes, but also can resist against RFID tag cloning. But, in their scheme the back-end database must use the brute force computation to search for the confirmation to be unmistakable. For this reason, the back-end database is not efficient, especially when massive data needed to be confirmed [14][15]. Therefore, we propose a mutual authentication protocol based on the Synchronized Secret Information. Our protocol is more secret and efficient.
    Appears in Collections:[Department of Information Management] Disserations and Theses

    Files in This Item:

    File Description SizeFormat
    095NHU05396013-001.pdf450KbAdobe PDF0View/Open
    index.html0KbHTML149View/Open


    All items in NHUIR are protected by copyright, with all rights reserved.


    DSpace Software Copyright © 2002-2004  MIT &  Hewlett-Packard  /   Enhanced by   NTU Library IR team Copyright ©   - Feedback