An efficient and reliable ultralightweight RFID authentication scheme for healthcare systems

A Kumar, K Singh, M Shariq, C Lal, M Conti… - Computer …, 2023 - Elsevier
In the era of the Internet of Communication Technologies (ICT), the Internet is becoming
more popular and widely used across the world. Radio Frequency IDentification (RFID) has …

Provably secured lightweight authenticated key agreement protocol for modern health industry

M Abdussami, R Amin, S Vollala - Ad Hoc Networks, 2023 - Elsevier
Abstract Internet of Medical Things (IoMT) has facilitated the healthcare industry by providing
ease of communication among doctors and patients living in remote areas for accomplishing …

[PDF][PDF] A heuristic-based linear time O (N) novel solution to N-Queen problem

G Kholiya, V Sharma, S Vats… - Journal of …, 2023 - … .s3.ap-south-1.amazonaws.com
N-Queen problem is a classic puzzle in which 'N'number of queens and a chessboard of
size NXN is given. The puzzle is to lay all the given queens on the chessboard in a way that …

The environmental benefits and burdens of RFID systems in Li-ion battery supply chains–An ex-ante LCA approach

S Ding, S Cucurachi, A Tukker, H Ward - Resources, Conservation and …, 2024 - Elsevier
This article explores the current and future technological pathways of RFID components and
quantifies their environmental impacts through life cycle assessment (LCA), and also …

An enhanced authentication protocol suitable for constrained RFID systems

M Hosseinzadeh, MR Servati, AM Rahmani… - IEEE …, 2024 - ieeexplore.ieee.org
RFID technology offers an affordable and user-friendly solution for contactless identification
of objects and individuals. However, the widespread adoption of RFID systems raises …

DTMS: A dual trust-based multi-level sybil attack detection approach in WSNs

T Khan, K Singh - Wireless Personal Communications, 2024 - Springer
Sensor networks have emerged as a promising technology for collecting data and capturing
information about the physical world. However, these networks are often deployed in harsh …

[HTML][HTML] Cryptanalysis of two recent ultra-lightweight authentication protocols

MR Servati, M Safkhani, S Ali, MH Malik, OH Ahmed… - Mathematics, 2022 - mdpi.com
Radio Frequency Identification (RFID) technology is a critical part of many Internet of Things
(IoT) systems, including Medical IoT (MIoT) for instance. On the other hand, the IoT devices' …

A blockchain and internet of things-based information infrastructure for the Chinese automotive sector carbon-credit market

Y Liu, Y Zhang, D Zheng - Financial Innovation, 2025 - Springer
In 2021, 12 fraudulent cases were identified in the Chinese carbon market. As a critical
component of this emerging market, China's carbon-credit scheme in the automotive sector …

UDAP: ultra-lightweight dot product-based authentication protocol for RFID systems

Z Akiirne, A Sghir, D Bouzidi - Cybersecurity, 2024 - Springer
The emergence of radio frequency identification (RFID) technology in the era of the Internet
of Things represents a remarkable advancement, but also brings its own set of challenges …

An Efficient and Secure Method for Simultaneous Ownership Transfer of Multiple Mobile Readers

MH Yang, CH Chen, JN Luo… - IEEE Systems …, 2023 - ieeexplore.ieee.org
In recent years, radio frequency identification technology has developed rapidly and has
been applied in supply chains. Products in supply chains are varied and may belong to …