Review of different classes of RFID authentication protocols

A Ibrahim, G Dalkılıc - Wireless Networks, 2019 - Springer
Radio-frequency identification (RFID) is an up-and-coming technology. The major limitations
of RFID technology are security and privacy concerns. Many methods, including encryption …

Blockchain-based mutual authentication security protocol for distributed RFID systems

S Wang, S Zhu, Y Zhang - 2018 IEEE Symposium on …, 2018 - ieeexplore.ieee.org
Since radio frequency identification (RFID) technology has been used in various scenarios
such as supply chain, access control system and credit card, tremendous efforts have been …

Security analysis and improvement on two RFID authentication protocols

S Wang, S Liu, D Chen - Wireless Personal Communications, 2015 - Springer
Several lightweight RFID authentication protocols have been proposed to settle the security
and privacy problems. Nevertheless, most of these protocols are analyzed and they are not …

Secure and efficient mutual authentication protocol for RFID conforming to the EPC C-1 G-2 standard

L Pang, L He, Q Pei, Y Wang - 2013 IEEE Wireless …, 2013 - ieeexplore.ieee.org
As low-cost tags based on the EPC C-1 G-2 standard are much limited in storage capacity
and computation power, most of the existing authentication protocols are too complicated to …

Lightweight mutual authentication RFID protocol for secure multi-tag simultaneous authentication in ubiquitous environments

J Kang - The Journal of Supercomputing, 2019 - Springer
RFID is a core technology enabling a ubiquitous environment. Its various applications have
shown great progress in our daily life in fields such as distribution management, non …

A RFID mutual authentication protocol based on AES algorithm

TA Pham, MS Hasan, H Yu - Proceedings of 2012 UKACC …, 2012 - ieeexplore.ieee.org
The emergence of RFID applications has huge influence to become pervasive in modern
life. However the vulnerability of the transmission through the air and the unique …

Secure and efficient lightweight RFID authentication protocol based on fast tag indexing

L Pang, H Li, L He, A Alramadhan… - International Journal of …, 2014 - Wiley Online Library
During the radio‐frequency identification authentication process, it is of great significance to
quickly find out the target tag from all tags stored in the database, because it affects the …

Security analysis and strengthening of an RFID lightweight authentication protocol suitable for VANETs

F Moradi, H Mala, BT Ladani - Wireless Personal Communications, 2015 - Springer
Due to the storage capacity and computational power restrictions of low-cost RFID tags
based on the EPC-C1G2 standard, most of the existing authentication protocols seem too …

Analisis Potensi Revitalisasi Pelayanan Angkutan Umum Perkotaan Di Kota Pontianak Menggunakan Metode Descriptive Analysis Dan K-Independent-Samples Test

S Basalim, A Akhmadali, MI Fitriani - Jurnal Arsip Rekayasa Sipil …, 2022 - jurnal.usk.ac.id
The two city transportation terminals, currently operating regularly, are located in Pontianak
City, which is: Siantan Terminal and Cempaka Terminal. This study examines the …

A novel smart photoelectric lock system: Speech transmitted by laser and speech to text

CY Guo, TL Hsieh, CC Chang, JW Perng - Heliyon, 2023 - cell.com
We propose a circuit that modulates a speech signal to a laser, using which the speech
signal can be transmitted using the laser. Also, it shows the use of a platform based on …