RCIA: A new ultralightweight RFID authentication protocol using recursive hash
RFID is one of the most protuberant systems in the field of ubiquitous computing. Since RFID
tags have limited computation capabilities, numerous ultralightweight authentication …
tags have limited computation capabilities, numerous ultralightweight authentication …
Ultralightweight RFID Authentication Protocols for Low‐Cost Passive RFID Tags
The field of pervasive computing especially the Internet of Things (IoT) network is evolving
due to high network speed and increased capacity offered by the 5G communication system …
due to high network speed and increased capacity offered by the 5G communication system …
A new ultralightweight RFID authentication protocol for passive low cost tags: KMAP
Abstract Radio Frequency IDentification (RFID) is one of the most promising identification
schemes in the field of pervasive systems. Unique identification and non-line of sight …
schemes in the field of pervasive systems. Unique identification and non-line of sight …
Toward designing a secure authentication protocol for IoT environments
Authentication protocol is a critical part of any application to manage the access control in
many applications. A former research recently proposed a lightweight authentication …
many applications. A former research recently proposed a lightweight authentication …
Novel lightweight RFID authentication protocols for inexpensive tags
Radio-frequency identification (RFID) systems represent a support technology employed for
the internet of things (IoT). Since RFID systems are now used extensively, it would be a …
the internet of things (IoT). Since RFID systems are now used extensively, it would be a …
Proving mutual authentication property of RCIA protocol in RFID based on logic of events
X Zhong, M **ao, T Zhang, K Yang… - Chinese Journal of …, 2022 - Wiley Online Library
The increasing commercialization and massive deployment of radio frequency identification
(RFID) systems has raised many security related issues which in return evokes the need of …
(RFID) systems has raised many security related issues which in return evokes the need of …
Pitfalls in ultralightweight authentication protocol designs
This article introduces prudent engineering practices and offers recommendations to follow,
together with typical mistakes to avoid, when designing new ultralightweight authentication …
together with typical mistakes to avoid, when designing new ultralightweight authentication …
A new ultralightweight rfid mutual authentication protocol: Sasi using recursive hash
RFID is one of the most prominent identification schemes in the field of pervasive systems.
Nonline of sight capability makes RFID systems much better choice than its contended …
Nonline of sight capability makes RFID systems much better choice than its contended …
The role of radio frequency identification in modern libraries
K Kasemsap - Handbook of research on inventive digital tools for …, 2015 - igi-global.com
This chapter reveals the role of radio frequency identification (RFID) in modern libraries, thus
demonstrating the theoretical and practical concept of RFID; the utilization of RFID in global …
demonstrating the theoretical and practical concept of RFID; the utilization of RFID in global …
Formal analysis and improvement on ultralightweight mutual authentication protocols of RFID
M **ao, W Li, X Zhong, K Yang… - Chinese Journal of …, 2019 - Wiley Online Library
Ultralightweight mutual authentication protocols (UMAP) of Radio frequency identification
(RFID) systems have attracted much attention from researchers. Many studies reveal that …
(RFID) systems have attracted much attention from researchers. Many studies reveal that …