Recently, many researchers have proposed RFID authentication protocols. These protocols are mainly consists of two types: symmetric key based and asymmetric key based. The symmetric key based systems usually have some weaknesses such as suffering brute force, de-synchronization, impersonation, and tracing attacks. In addition, the asymmetric key based systems usually suffer from impersonation, man-in-the-middle, physical, and tracing attacks. To get rid of those weaknesses and reduce the system workload, we adopt elliptic curve cryptosystem (ECC) to construct an asymmetric key based RFID authentication system. Our scheme needs only two passes and can resist various kinds of attacks. It not only outperforms the other RFID schemes having the ...
Information in patients' medical histories is subject to various security and privacy concerns. Mean...
AbstractIn this paper, a secure mutual authentication scheme for an RFID implant system is developed...
[[abstract]]Radio frequency identification tag authentication protocols are generally classified as ...
Abstract—To solve the problems of consumers ’ security and privacy, a new RFID authentication method...
[[abstract]]Radio frequency identification (RFID) tags have been widely deployed in many application...
Recently, Radio Frequency Identification (RFID) technique has been widely deployed in many applicati...
With the widely development and deployment of Radio Frequency Identification (RFID) technology for n...
Abstract. After years of discussion within the RFID security commu-nity whether or not asymmetric cr...
The emergence of pervasive computing devices such as RFID tags raises numerous privacy issues. Crypt...
Abstract—Operational and security requirements for RFID systems such as system scalability, anonymit...
The implementation of RFID technology has globally impacted several industries and this revolution h...
The availability of safety has always been a challenge in all fields of computing and networking, an...
Abstract. The emergence of pervasive computing devices such as RFID tags raises numerous privacy iss...
Radio frequency identification (RFID) authentication is an indispensable part of RFID applications, ...
Advances in communication and information technologies have led to the emergence of Internet of Thin...
Information in patients' medical histories is subject to various security and privacy concerns. Mean...
AbstractIn this paper, a secure mutual authentication scheme for an RFID implant system is developed...
[[abstract]]Radio frequency identification tag authentication protocols are generally classified as ...
Abstract—To solve the problems of consumers ’ security and privacy, a new RFID authentication method...
[[abstract]]Radio frequency identification (RFID) tags have been widely deployed in many application...
Recently, Radio Frequency Identification (RFID) technique has been widely deployed in many applicati...
With the widely development and deployment of Radio Frequency Identification (RFID) technology for n...
Abstract. After years of discussion within the RFID security commu-nity whether or not asymmetric cr...
The emergence of pervasive computing devices such as RFID tags raises numerous privacy issues. Crypt...
Abstract—Operational and security requirements for RFID systems such as system scalability, anonymit...
The implementation of RFID technology has globally impacted several industries and this revolution h...
The availability of safety has always been a challenge in all fields of computing and networking, an...
Abstract. The emergence of pervasive computing devices such as RFID tags raises numerous privacy iss...
Radio frequency identification (RFID) authentication is an indispensable part of RFID applications, ...
Advances in communication and information technologies have led to the emergence of Internet of Thin...
Information in patients' medical histories is subject to various security and privacy concerns. Mean...
AbstractIn this paper, a secure mutual authentication scheme for an RFID implant system is developed...
[[abstract]]Radio frequency identification tag authentication protocols are generally classified as ...