[PDF][PDF] OCTOPUS: An edge-fog mutual authentication scheme.

MH Ibrahim - Int. J. Netw. Secur., 2016 - academia.edu
Authentication is an important and challenging issue for the security of Fog computing since,
services are offered to massive-scale end users (Fog users or Edge) by front Fog servers (or …

A secure privacy and authentication protocol for passive RFID tags

CH Wei, MS Hwang, AYH Chin - International Journal of …, 2017 - inderscienceonline.com
A privacy and authentication protocol (PAP) requires a tag to perform four simple operations
in mobile communications: comparing two numbers used to execute a hash function, storing …

Outage capacity analysis for ambient backscatter communication systems

S Xing, M Ding, Z Lin - 2018 28th International …, 2018 - ieeexplore.ieee.org
Ambient backscatter communication (AmBC) has become a promising technology to the
Internet of Things (IoT) due to its low cost and high energy-efficiency. Since the AmBC …

A lightweight RFID authentication protocol with confidentiality and anonymity

Z Shi, J Chen, S Chen, S Ren - 2017 IEEE 2nd Advanced …, 2017 - ieeexplore.ieee.org
Radio Frequency IDentification (RFID) is one of the most important sensing techniques for
Internet of Things (IoT) and RFID systems have been applied to various different fields. But …

[PDF][PDF] SE-H: Secure and efficient hash protocol for RFID system

S Nashwan - … Journal of Communication Networks and Information …, 2017 - researchgate.net
The Radio Frequency Identification (RFID) systems are suffered from the growing of security
vulnerabilities. In the RFID Applications, an attackers may exploit these vulnerabilities to …

An authentication protocol for lightweight NFC mobile sensors payment

TH Feng, MS Hwang, LW Syu - Informatica, 2016 - content.iospress.com
Abstract Following the White Paper HCE that Google released in August 2014, it was
expected that NFC mobile phone payment would cause a wave of security discussion. After …

RFID authentication protocols based on error-correcting codes: a survey

N Chikouche, F Cherif, PL Cayrel… - Wireless Personal …, 2017 - Springer
Code-based cryptography is a very promising research area. It allows the construction of
different cryptographic mechanisms (eg identification protocol, public-key cryptosystem …

Cryptanalysis of Kumar's Remote User Authentication Scheme with Smart Card

MS Hwang, EF Cahyadi, YC Chou… - 2018 14th International …, 2018 - ieeexplore.ieee.org
One of the common necessity to have secret communication through Internet is to
authenticate the legality of users. The simplest and most popular authentication technique to …

Two mutual authentication protocols based on zero-knowledge proofs for RFID systems

H Assidi, EB Ayebie, EM Souidi - … , South Korea, November 29-December 1 …, 2018 - Springer
RFID technology is becoming more useful and it is applied in various domains such as
inventory management, supply chain, logistics, control access, e-passport, e-health and …

Cryptanalysis of the serverless rfid authentication and search protocols

CH Wei, CY Yang, MS Hwang - … and Applications: Proceedings of the 3rd …, 2019 - Springer
In this article, we analyze Tan et al.'s serverless RFID authentication and search protocols.
Tan et al. proposed a serverless RFID system to solve this problem without a central …