Analysis on security and privacy guidelines: RFID-based IoT applications
HA Abdulghani, NA Nijdam, D Konstantas - Ieee Access, 2022 - ieeexplore.ieee.org
The Internet of Things (IoT) comprises many technologies, among them is Radio Frequency
Identification (RFID), which can be used to track single or multiple objects. This technology …
Identification (RFID), which can be used to track single or multiple objects. This technology …
Combining Rabin cryptosystem and error correction codes to facilitate anonymous authentication with un-traceability for low-end devices
HY Chien - Computer Networks, 2013 - Elsevier
Secure authentication of low cost Radio Frequency Identification (RFID) with low computing
capacity is a big challenge, due to the constraint of the limited resources and the privacy …
capacity is a big challenge, due to the constraint of the limited resources and the privacy …
Attacks and defenses for single-stage residue number system PRNGs
A Vennos, K George, A Michaels - IoT, 2021 - mdpi.com
This paper explores the security of a single-stage residue number system (RNS)
pseudorandom number generator (PRNG), which has previously been shown to provide …
pseudorandom number generator (PRNG), which has previously been shown to provide …
De-synchronization attack on quadratic residues-based RFID ownership transfer
HY Chien - 2015 10th Asia joint conference on information …, 2015 - ieeexplore.ieee.org
Radio Frequency Identification (RFID) ownership transfer protocol aims at securely updating
RFID tag's internal state and key such that only the current owner of a tag is allowed to …
RFID tag's internal state and key such that only the current owner of a tag is allowed to …
An intelligent RFID system for improving elderly daily life independent in indoor environment
KT Huang, PY Lin, CY Chiang, JS Chang… - … , IA, USA, June 28-July 2 …, 2008 - Springer
Since elderly obliviousness causes social inconvenience and psychical complaint, elders
often forget daily schedules and miss their personal belongings such pillboxes or keys …
often forget daily schedules and miss their personal belongings such pillboxes or keys …
[PDF][PDF] An overview of RFID technology, application, and security/privacy threats and solutions
C Huang - George Mason University, 2009 - Citeseer
Radio Frequency Identification (RFID) has been around for nearly 50 years. RFID was first
used during World War II in Friend-or-Foe identification system. Ever since then, RFID has …
used during World War II in Friend-or-Foe identification system. Ever since then, RFID has …
[PDF][PDF] Nesneler İzlenebilir ve Yönetilebilir mi? Çözüm: RFID
ME Yüksel, ŞD Odabaşı - Akademik Bilişim, 2009 - ab.org.tr
Doğru bilgi ve hız veri toplamanın iki temel unusurudur. Dolayısıyla, nesne ve nesneye ait
hizmetlerin hareketlerini izlemek, yönetmek, bunları ilgili yerlere yönlendirmek için nesneler …
hizmetlerin hareketlerini izlemek, yönetmek, bunları ilgili yerlere yönlendirmek için nesneler …
On the security of two RFID mutual authentication protocols
In this paper, the security of two recent RFID mutual authentication protocols are
investigated. The first protocol is a scheme proposed by Huang et al. 7 and the second one …
investigated. The first protocol is a scheme proposed by Huang et al. 7 and the second one …
Efficient authentication scheme with tag-identity protection for EPC Class 2 Generation 2 version 2 standards
HY Chien - International Journal of Distributed Sensor …, 2017 - journals.sagepub.com
Various radio-frequency identification standards and products have been designed to meet
various market needs. To satisfy various requirements and integrate important features of …
various market needs. To satisfy various requirements and integrate important features of …
Security of Lightweight Cryptographic Primitives
ADG Vennos - 2021 - vtechworks.lib.vt.edu
Abstract Internet-of-Things (IoT) devices are increasing in popularity due to their ability to
help automate many aspects of daily life while performing these necessary duties on billions …
help automate many aspects of daily life while performing these necessary duties on billions …