A systematic review of RFID applications and diffusion: key areas and public policy issues

K Jung, S Lee - Journal of Open Innovation: Technology, Market, and …, 2015 - mdpi.com
RFID applicants called as e-ID, smart tag, and contactless smart card are being applied to
numerous areas in our daily life, including tracking manufactured goods, currency, and …

Security enhancement mechanism based on contextual authentication and role analysis for 2G-RFID systems

W Tang, M Chen, J Ni, X Yang - Sensors, 2011 - mdpi.com
The traditional Radio Frequency Identification (RFID) system, in which the information
maintained in tags is passive and static, has no intelligent decision-making ability to suit …

[PDF][PDF] An Improved Key Exchange Protocol for WLAN That Can Resist MITM Attack Which Benefit from RTT

R LI, W DOU - Journal of Computational Information Systems, 2013 - Citeseer
By the advancing of microelectronics, we propose an improved version of Aydos's protocol,
which uses the restraint of RTT. The new protocol can resist two types of MITM attack that …