Improve safety and security of intelligent railway transportation system based on balise using machine learning algorithm and fuzzy system

A Falahati, E Shafiee - International Journal of Intelligent Transportation …, 2022 - Springer
With the advancement of modern rail transport systems, high-speed railways' safety and
reliability is improved enormously due to proper intelligent traffic management systems. The …

Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems

H Jannati - International Journal of Critical Infrastructure Protection, 2015 - Elsevier
Abstract Radio Frequency Identification (RFID) technology is used in myriad applications
because of its speed of execution, ease of manufacturing and usability. In the domain of …

Detecting relay attacks on RFID communication systems using quantum bits

H Jannati, E Ardeshir-Larijani - Quantum Information Processing, 2016 - Springer
RFID systems became widespread in variety of applications because of their simplicity in
manufacturing and usability. In the province of critical infrastructure protection, RFID systems …

RFID light weight server-less search protocol based on nlfsrs

A Falahati, H Azizi, RM Edwards - 2016 8th International …, 2016 - ieeexplore.ieee.org
Spectacular expansion of RFID systems and applications by several industries such as
business, electronics, health, marketing, transportation, etc. has made RFID ever more …

Subtle flaws in the secure rfid tag searching protocol: Srts

I Erguler - Wireless Personal Communications, 2016 - Springer
Secure RFID searching emerged as a new application field in RFID systems finds out
whether a specific RFID tag is nearby within a group of tags in a secure manner. Although …

Tag-Reader Authentication System Guarded by Negative Identifier Filtering and Distance Bounding

R Kachhia, P Agrawal, ML Das - … India, January 10–13, 2019, Proceedings …, 2019 - Springer
In conventional authentication process, the legitimacy of communicating entity is directly
checked with Authentication Server. This process is found efficient; however, it allows an …

[图书][B] Factors that Influence Medical Professionals' Noncompliance with Organizational Mobile Device Security Policies

R Nelson - 2019 - search.proquest.com
Rapid technological change is driving the increased use of personal mobile devices for work
purposes in healthcare settings, but there are significant risks associated with the use of …

An Improved RFID Search Protocol

P Wang, Z Zhou - Cloud Computing and Security: Third International …, 2017 - Springer
In this paper, we propose an improved scheme to solve the security risks of S-S's scheme. In
order to resist the replay attack, the improved protocol uses the pseudo identifier XOR to …

[引用][C] Machine Learning Method for Radio Frequency Identification

D Huang - 2023 - RMIT University Australia