Acoustic-based sensing and applications: A survey
With advancements of wireless and sensing technologies, recent studies have
demonstrated technical feasibility and effectiveness of using acoustic signals for sensing. In …
demonstrated technical feasibility and effectiveness of using acoustic signals for sensing. In …
Lightweight and practical anonymous authentication protocol for RFID systems using physically unclonable functions
Radio frequency identification (RFID) has been considered one of the imperative
requirements for implementation of Internet-of-Things applications. It helps to solve the …
requirements for implementation of Internet-of-Things applications. It helps to solve the …
A review and analysis of secure and lightweight ECC‐based RFID authentication protocol for Internet of Vehicles
Radio‐frequency identification (RFID) technology has proliferated over the last few years
and being deployed as identification technology in numerous domains like intelligent …
and being deployed as identification technology in numerous domains like intelligent …
A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol
YP Liao, CM Hsiao - Ad hoc networks, 2014 - Elsevier
Abstract IoT (Internet of Things) is a type of network where ICT (Information and
Communication Technology) links any physical objects to the internet to perform information …
Communication Technology) links any physical objects to the internet to perform information …
SAPWSN: A secure authentication protocol for wireless sensor networks
With the advancement of RFID systems, there is a need for secure RFID authentication that
can provide security against a variety of attacks, so designing a perfectly safe protocol has …
can provide security against a variety of attacks, so designing a perfectly safe protocol has …
An enhanced authentication scheme with privacy preservation for roaming service in global mobility networks
Global mobility network (GLOMONET) provides global roaming service to ensure ubiquitous
connectivity for users traveling from one network to another. It is very crucial not only to …
connectivity for users traveling from one network to another. It is very crucial not only to …
A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem
Z Zhao - Journal of medical systems, 2014 - Springer
With the fast advancement of the wireless communication technology and the widespread
use of medical systems, the radio frequency identification (RFID) technology has been …
use of medical systems, the radio frequency identification (RFID) technology has been …
Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol
The radio frequency identification (RFID) technology has been widely adopted and being
deployed as a dominant identification technology in a health care domain such as medical …
deployed as a dominant identification technology in a health care domain such as medical …
An efficient mutual authentication RFID scheme based on elliptic curve cryptography
JS Chou - The Journal of supercomputing, 2014 - Springer
Radio frequency identification (RFID) tags have been widely deployed in many applications,
such as supply chain management, inventory control, and traffic card payment. However …
such as supply chain management, inventory control, and traffic card payment. However …
Lightweight fog computing-based authentication protocols using physically unclonable functions for internet of medical things
TF Lee, WY Chen - Journal of Information Security and Applications, 2021 - Elsevier
Abstract The Internet of Medical Things (IoMT) is a network of connections between a
medical information system and medical equipment. Fog computing for IoMT is a model for …
medical information system and medical equipment. Fog computing for IoMT is a model for …