RFID systems: research trends and challenges

M Bolic, D Simplot-Ryl, I Stojmenovic - 2010 - books.google.com
This book provides an insight into the'hot'field of Radio Frequency Identification (RFID)
Systems In this book, the authors provide an insight into the field of RFID systems with an …

[PDF][PDF] A Lightweight RFID Security Protocol Based on Elliptic Curve Crytography.

Q Qian, YL Jia, R Zhang - Int. J. Netw. Secur., 2016 - ijns.jalaxy.com.tw
Abstract Radio Frequency Identification (RFID) is a promising new technology that is widely
deployed for object tracking and monitoring, ticketing, supply-chain management …

Exploring the RFID mutual authentication domain

SM Mohsin, IA Khan, SM Abrar Akber… - … Journal of Computers …, 2021 - Taylor & Francis
Mutual Authentication is the initial and the most significant line of defense in any open and
trusted network system. Weaknesses in mutual authentication protocol may lead to …

RFID authentication protocols based on ECC encryption schemes

M Benssalah, M Djeddou… - 2012 IEEE International …, 2012 - ieeexplore.ieee.org
In this paper, we propose a new RFID authentication protocol based on elliptic curves
ElGamal encryption schemes. The proposed protocol needs two passes, requires only …

Efficient P2P-based mutual authentication protocol for RFID system security of EPC network using asymmetric encryption algorithm

XU He, S WANG, R WANG, Z WANG - The Journal of China Universities of …, 2011 - Elsevier
Internet of Things (IoT) is a new vision of the future technological ubiquity in ubiquitous
computing, which becomes the mapping from the real world to the digital one. Radio …

Efficient and low-cost rfid authentication schemes

A Miyaji, MS Rahman, M Soshi - arXiv preprint arXiv:1209.5076, 2012 - arxiv.org
Security in passive resource-constrained Radio Frequency Identification (RFID) tags is of
much interest nowadays. Resistance against illegal tracking, cloning, timing, and replay …

Web authentication protocol using zero knowledge proof

U Thiruvaazhi, R Divya - Information Security Journal: A Global …, 2011 - Taylor & Francis
Market research surveys report that 75% of hacks occur at the application layer. Of the
multiple vulnerabilities that exist in Web application software, proper authentication of the …

Cryptographic approaches for improving security and privacy issues of RFID systems

M Ohkubo, K Suzuki, S Kinoshita - RFID Systems: Research …, 2010 - Wiley Online Library
RFID is expected to provide a new communication style for identifying items. Simultaneous
scanning of many tags or identification of a single tag's ID through wireless communications …

Secure Integration of RFID Technology in Personal Documentation for Seamless Identity Validation

P Najera, F Moyano, J Lopez - 3rd Symposium of Ubiquitous Computing …, 2009 - Springer
Seamless human identification and authentication in the information system is a
fundamental step towards the transparent interaction between the user and its context …

[PDF][PDF] Cryptographic approaches to security and privacy issues in pervasive computing.

J Cho - 2014 - repository.royalholloway.ac.uk
Technological innovation has enabled tiny devices to participate in pervasive computing.
Such devices are particularly vulnerable to security and privacy threats, because of their …