strand spaces
Recently Published Documents


TOTAL DOCUMENTS

46
(FIVE YEARS 4)

H-INDEX

10
(FIVE YEARS 1)

2021 ◽  
pp. 175-197
Author(s):  
Riccardo Focardi ◽  
Flaminia L. Luccio

2020 ◽  
Vol 9 (1) ◽  
pp. 16 ◽  
Author(s):  
Ghaith Khalil ◽  
Robin Doss ◽  
Morshed Chowdhury

Counterfeiting and theft have always been problems that incur high costs and result in considerable losses for international markets. In this research paper, we address the issue of counterfeiting while using radio frequency identification RFID technology in retail systems or other industries by presenting a new anti-counterfeiting and anti-theft system for the retail market. This system addresses the two abovementioned issues and provides a solution that can save retail systems millions of dollars yearly. The proposed system achieves the objective of preventing or minimising the counterfeiting and theft of tagged products. At the same time, it provides a strong indication of suspiciously sold or obtained items. Furthermore, we conducted a security analysis to prove the correctness of our protocol on the basis of the strand spaces.


Author(s):  
Ghaith Khalil ◽  
Robin Doss ◽  
Morshed Chowdhury

Counterfeiting and theft have always been problems that incur high costs and results in considerable losses for the international markets. In this research paper, we will address the issue of counterfeiting while using RFID technology in retailer systems or other industries by presenting a new anti-counterfeiting and anti-theft system for the retailer market. This system will address the two above mentioned issues and provide a solution that can save the retailer systems millions of dollars yearly. This proposed system will achieve the objective of preventing or minimising the counterfeiting and theft of tagged products. At the same time, it will provide a strong indication for suspiciously sold or obtained items. Furthermore, we conducted a security analysis to prove the correctness of our protocol on the basis of the strand spaces.


2014 ◽  
Vol 58 (4) ◽  
pp. 572-587 ◽  
Author(s):  
W. Song ◽  
B. Hu
Keyword(s):  

2013 ◽  
Vol 457-458 ◽  
pp. 1134-1138
Author(s):  
Bao Ju Liu ◽  
Jian Xi Wang

This paper focuses on different password guessing attack forms of attacker performed based on the strand spaces model. We extend the attacker’s strand spaces model in order to describe and analyze the guessing ability of the attacker. A protocol has been improved by the use of Hash function. The improved protocol has been proved to resist password guessing attack.


2011 ◽  
Vol 19 (5) ◽  
pp. 975-1025 ◽  
Author(s):  
Allaa Kamil ◽  
Gavin Lowe
Keyword(s):  

Sign in / Sign up

Export Citation Format

Share Document