… cloud-basedRFIDauthentication scheme. In order to reduce the RFID tag's overhead, the proposed authentication … the cloud server to the RFID system. Performance simulation shows …
MI Ahmed, G Kannan - Journal of Information & Knowledge …, 2021 - World Scientific
… RFID communications. However, the level of security is still inadequate. In this paper, we proposed a cloudbased remote RFIDauthentication … cloudbased remote RFIDauthentication …
K Fan, W Jiang, Q Luo, H Li, Y Yang - Journal of the Franklin Institute, 2021 - Elsevier
… In order to deal with these problems, we analyze the related security privacy issues in IoV system in this paper and propose a cloud-basedRFIDauthentication scheme that is suitable …
… cloud-basedRFIDauthentication technique that is both efficient and trustworthy. To decrease the RFID tag’s overhead, the suggested authentication … cloud server into the RFID system. …
… The advantage of cloud-based … RFIDauthentication protocol based on Schnorr identification scheme. In 2007, Batina et al. [3] has come up with a similar type of RFIDauthentication …
S Xie, F Zhang, R Cheng - Wireless Personal Communications, 2021 - Springer
… With the development of cloud computing, some researchers have shown great interest in the cloudbasedRFID systems. Xie et al. [40] proposed a cloudbasedRFIDauthentication …
… This section proposes two lightweight cloud computing-based RFIDauthentication protocols for … Yang, "A lightweight authentication scheme for cloud-basedRFID healthcare systems," …
… In light of these challenges, this article proposes an RFID-based authentication protocol … the authentication processes of the involved entities, ensuring the privacy of both RFID tags and …
… Using \(\chi\)per, we design \(\chi\)perbp as a security protocol for cloud-basedRFID systems in Section 4 and argue its security and efficiency in Section 5. Finally, we conclude the …