Abstract—Two essential problems are still posed in terms of Radio Frequency Identification (RFID) systems, including: security and limitation of resources. Recently, Li et al.'s proposed a mutual authentication scheme for RFID systems in 2014, it is based on Quasi Cyclic-Moderate Density Parity Check (QC-MDPC) McEliece cryptosystem. This cryptosystem is designed to reducing the key sizes. In this paper, we found that this scheme does not provide untraceability and forward secrecy properties. Furthermore, we propose an improved version of this scheme to eliminate existing vulnerabilities of studied scheme. It is based on the QC-MDPC McEliece cryptosystem with padding the plaintext by a random bit-string. Our work also includes a securit...
Wireless radio frequency identification (RFID) has been widely used as the core technology of the In...
This paper proposes an improved two-way security authentication protocol to improve the security lev...
Recently, Chen and Deng proposed a mutual authentication protocol [7]. Their scheme is based on a cy...
[[abstract]]Radio frequency identification (RFID) tags have been widely deployed in many application...
[[abstract]]In 2004, Ari Juels proposed a Yoking-Proofs protocol for RFID systems. Their aim is to p...
RFID technology has become popular in many applications; however, most of the RFID products lack sec...
Abstract: This work presents an ultra-lightweight, cryptographic, mutual authentication protocol for...
Nowadays, the Radio Frequency Identification (RFID) technology is widely used in lots of application...
The wide deployment of RFID systems has raised many concerns about the security and privacy. Many RF...
The design of a secure authentication scheme for Radio Frequency Identification (RFID) systems has b...
Abstract. The design of secure authentication solutions for low-cost RFID tags is still an open and ...
The availability of safety has always been a challenge in all fields of computing and networking, an...
Radio frequency identification (RFID) technology has many applications such as supply chain manageme...
The first line of defence against wireless attacks in Radio Frequency Identi cation (RFID) systems i...
In this paper we present a novel approach to authentication and privacy in RFID systems based on the...
Wireless radio frequency identification (RFID) has been widely used as the core technology of the In...
This paper proposes an improved two-way security authentication protocol to improve the security lev...
Recently, Chen and Deng proposed a mutual authentication protocol [7]. Their scheme is based on a cy...
[[abstract]]Radio frequency identification (RFID) tags have been widely deployed in many application...
[[abstract]]In 2004, Ari Juels proposed a Yoking-Proofs protocol for RFID systems. Their aim is to p...
RFID technology has become popular in many applications; however, most of the RFID products lack sec...
Abstract: This work presents an ultra-lightweight, cryptographic, mutual authentication protocol for...
Nowadays, the Radio Frequency Identification (RFID) technology is widely used in lots of application...
The wide deployment of RFID systems has raised many concerns about the security and privacy. Many RF...
The design of a secure authentication scheme for Radio Frequency Identification (RFID) systems has b...
Abstract. The design of secure authentication solutions for low-cost RFID tags is still an open and ...
The availability of safety has always been a challenge in all fields of computing and networking, an...
Radio frequency identification (RFID) technology has many applications such as supply chain manageme...
The first line of defence against wireless attacks in Radio Frequency Identi cation (RFID) systems i...
In this paper we present a novel approach to authentication and privacy in RFID systems based on the...
Wireless radio frequency identification (RFID) has been widely used as the core technology of the In...
This paper proposes an improved two-way security authentication protocol to improve the security lev...
Recently, Chen and Deng proposed a mutual authentication protocol [7]. Their scheme is based on a cy...