An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography

D He, S Zeadally - IEEE internet of things journal, 2014 - ieeexplore.ieee.org
Advances in information and communication technologies have led to the emergence of
Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings …

Research on evaluation index and application of rockburst risk in deep strip mining

B Jiang, H Ji, L Fu, S Gu, T Zou, J Lu - Shock and Vibration, 2020 - Wiley Online Library
The practice shows that deep strip mining induces rockburst disaster easily. Accurately
evaluating rockburst risk of the strip coal pillar is of great significance for ensuring the safety …

Hierarchical ECC-based RFID authentication protocol

L Batina, S Seys, D Singelée… - International workshop on …, 2011 - Springer
Abstract RFID (Radio Frequency Identification) technology enables readers to scan remote
RFID tags, and label the objects and people to which they are attached. Current …

Authentication protocol for securing internet of things

A Maarof, M Senhadji, Z Labbi… - Proceedings of the Fourth …, 2018 - dl.acm.org
The Internet of things (IoT) is become an important research topic because it integrates
various sensors and objects to communicate directly with one another object without human …

On elliptic curve based untraceable RFID authentication protocols

EK Ryu, DS Kim, KY Yoo - Proceedings of the 3rd ACM Workshop on …, 2015 - dl.acm.org
An untraceable RFID authentication scheme allows a legitimate reader to authenticate a tag,
and at the same time it assures the privacy of the tag against unauthorized tracing. In this …

Adding features of educational games for teaching Physics

K Muñoz, J Noguez, P Mc Kevitt, L Neri… - 2009 39th IEEE …, 2009 - ieeexplore.ieee.org
Virtual laboratories (VLs) have to overcome important challenges to improve student
knowledge, understanding and motivation. This research aims to test the hypothesis that …

Strong Security and Privacy of RFID System for Internet of Things Infrastructure

ML Das - … , Privacy, and Applied Cryptography Engineering: Third …, 2013 - Springer
Abstract RFID (Radio Frequency IDentification) system has found enormous applications in
retail, health care, transport, and home appliances. Over the years, many protocols have …

EC-RAC: enriching a capacious RFID attack collection

T Van Deursen, S Radomirović - … , RFIDSec 2010, Istanbul, Turkey, June 8 …, 2010 - Springer
We demonstrate two classes of attacks on EC-RAC, a growing set of RFID protocols. Our first
class of attacks concerns the compositional approach used to construct a particular revision …

Wide–weak privacy–preserving RFID authentication protocols

YK Lee, L Batina, D Singelée… - … Wireless Systems: Second …, 2010 - Springer
The emergence of pervasive computing devices such as RFID tags raises numerous privacy
issues. Cryptographic techniques are commonly used to enable tag-to-server authentication …

Privacy-preserving authorized RFID authentication protocols

N Li, Y Mu, W Susilo, F Guo, V Varadharajan - … Identification: Security and …, 2014 - Springer
Abstract Radio Frequency Identification (RFID) has been widely ad-opted for object
identification. An RFID system comprises three essential components, namely RFID tags …