A secure elliptic curve-based RFID protocol

S Martínez, M Valls, C Roig, JM Miret, F Giné - Journal of Computer …, 2009 - Springer
Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores
has increased. Nevertheless, some of these systems present privacy problems that may …

[PDF][PDF] An elliptic curve and zero knowledge based forward secure RFID protocol

S Martınez, M Valls, C Roig, F Gine, JM Miret - 2007 - researchgate.net
Nowadays, the use of Radio Frequency Identification (RFID) systems in industry and stores,
has been increased. Nevertheless, some of this systems have privacy problems that may …

[PDF][PDF] A combined approach of elliptic curve and zero knowledge based forward secure protocol

M Sandhya, TR Rangaswamy - World Academy of Science, Engineering …, 2009 - Citeseer
Radio frequency identification (RFID) is an important part in mobile and ubiquitous domain,
and brings enormous productivity benefits in applications where objects require automatic …

A secure and privacy friendly ECC based RFID authentication protocol for practical applications

A Arslan, SA Çolak, S Ertürk - Wireless Personal Communications, 2021 - Springer
Radio frequency identification (RFID) is a promising and widespread wireless
communication technology for entity identification or authentication. By the emerging Internet …

Wide–weak privacy–preserving RFID authentication protocols

YK Lee, L Batina, D Singelée… - … Wireless Systems: Second …, 2010 - Springer
The emergence of pervasive computing devices such as RFID tags raises numerous privacy
issues. Cryptographic techniques are commonly used to enable tag-to-server authentication …

Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography

MS Farash - The Journal of Supercomputing, 2014 - Springer
Radio frequency identification (RFID) is a wireless technology for automatic identification
and data capture. Security and privacy issues in the RFID systems have attracted much …

Lightweight authentication protocol for RFID-enabled systems based on ECC

K Kaur, N Kumar, M Singh… - 2016 IEEE global …, 2016 - ieeexplore.ieee.org
Radio Frequency Identification (RFID) is a leading wireless technology with respect to
Automatic Identification and Data Capture (AIDC). With its increasing popularity amongst the …

An efficient mutual authentication RFID scheme based on elliptic curve cryptography

JS Chou - The Journal of supercomputing, 2014 - Springer
Radio frequency identification (RFID) tags have been widely deployed in many applications,
such as supply chain management, inventory control, and traffic card payment. However …

Security and privacy analysis of recently proposed ecc-based rfid authentication schemes

A Arslan, MA Bingöl - Cryptology ePrint Archive, 2022 - eprint.iacr.org
Abstract Elliptic Curve Cryptography (ECC) has been popularly used in RFID authentication
protocols to efficiently overcome many security and privacy issues. Even if the strong …

Yet another strong privacy-preserving RFID mutual authentication protocol

R Songhela, ML Das - … : 4th International Conference, SPACE 2014, Pune …, 2014 - Springer
Abstract Radio Frequency IDentification (RFID) systems are gaining enormous interests in
industry due to their vast applications such as supply chain, access control, inventory …