[HTML][HTML] Research communities in cyber security vulnerability assessments: A comprehensive literature review

F Heiding, S Katsikeas, R Lagerström - Computer Science Review, 2023 - Elsevier
Ethical hacking and vulnerability assessments are gaining rapid momentum as academic
fields of study. Still, it is sometimes unclear what research areas are included in the …

Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy

S Sundaresan, R Doss, W Zhou, S Piramuthu - Computer Communications, 2015 - Elsevier
In this paper we propose a secure ownership transfer protocol for a multi-tag multi-owner
RFID environment that provides individual-owner-privacy. To our knowledge, the existing …

Key evolving RFID systems: Forward/backward privacy and ownership transfer of RFID tags

T Dimitriou - Ad Hoc Networks, 2016 - Elsevier
RFID, which stands for Radio Frequency Identification, is a relatively new technology often
envisioned as an enabler of the Internet of Things. The widespread use of this technology …

An ownership transfer scheme using mobile RFIDs

CL Chen, CF Chien - Wireless personal communications, 2013 - Springer
RFID reader equipment is widely used in hand-held devices; thus, the security of the
connection between mobile readers and RFID servers is an important issue. In this paper …

Practical attacks on a RFID authentication protocol conforming to EPC C-1 G-2 standard

MH Habibi, M Gardeshi, MR Alaghband - arXiv preprint arXiv:1102.0763, 2011 - arxiv.org
Yeh et al. recently have proposed a mutual authentication protocol based on EPC Class-1
Gen.-2 standard [1]. They have claimed that their protocol is secure against adversarial …

Attacks on a lightweight mutual authentication protocol under EPC C-1 G-2 standard

MH Habibi, MR Alagheband, MR Aref - … and Privacy of Mobile Devices in …, 2011 - Springer
Yeh et al. have recently proposed a mutual authentication protocol based on EPC Class-1
Gen.-2 standard. They claim their protocol is secure against adversarial attacks and also …

[PDF][PDF] On the security of two ownership transfer protocols and their improvements.

N Bagheri, SF Aghili, M Safkhani - Int. Arab J. Inf. Technol., 2018 - iajit.org
In recent years, Radio Frequency Identification (RFID) systems are widely used in many
applications. In some applications, the ownership of an RFID tag might change. To provide a …

Security analysis of lightweight schemes for RFID systems

MRS Abyaneh - 2012 - bora.uib.no
This thesis mainly examines the security analysis of lightweight protocols proposed for
providing security and privacy for RFID systems. To achieve this goal, first we give a brief …

Tag ownership transfer in radio frequency identification systems: A survey of existing protocols and open challenges

E Taqieddin, H Al-Dahoud, H Niu… - IEEE Access, 2018 - ieeexplore.ieee.org
Radio frequency identification (RFID) is a modern approach to identify and track several
assets at once in a supply chain environment. In many RFID applications, tagged items are …

Mitigating threats and vulnerabilities of RFID in IoT through outsourcing computations for public key cryptography

M Khodjaeva, M Obaidat, D Salane - Security, Privacy and Trust in the IoT …, 2019 - Springer
The widespread use of IoT devices that rely on Radio Frequency IDentification (RFID)
technologies has resulted in numerous benefits; however, device connectivity has also …