A cloud-based authentication protocol for RFID supply chain systems

IC Lin, HH Hsu, CY Cheng - Journal of Network and Systems Management, 2015 - Springer
RFID technology is the popular technology in recent years and applies to many automatic
identification applications such as supply chain management, thief-prevention and so on …

A cloud-based RFID authentication protocol with insecure communication channels

H **ao, AA Alshehri… - 2016 IEEE Trustcom …, 2016 - ieeexplore.ieee.org
Radio Frequency Identification (RFID) has become a widespread technology to
automatically identify objects and with the development of cloud computing, cloud-based …

Cloud-based remote RFID authentication for security of smart internet of things applications

MI Ahmed, G Kannan - Journal of Information & Knowledge …, 2021 - World Scientific
Radio frequency is the technology which enables smart labels to things. Thus, even physical
things can participate in computing process. It is becoming popular due to its technological …

A new security and privacy framework for RFID in cloud computing

S Kardas, S Celik, MA Bingöl… - 2013 IEEE 5th …, 2013 - ieeexplore.ieee.org
RFID is a leading technology that has been rapidly deployed in several daily life
applications that require strong security and privacy mechanisms. However, RFID systems …

A secure and privacy friendly ECC based RFID authentication protocol for practical applications

A Arslan, SA Çolak, S Ertürk - Wireless Personal Communications, 2021 - Springer
Radio frequency identification (RFID) is a promising and widespread wireless
communication technology for entity identification or authentication. By the emerging Internet …

A novel dual authentication protocol (DAP) for multi-owners in cloud computing

AR Sha**a, P Varalakshmi - Cluster Computing, 2017 - Springer
Cloud computing has reached the peak of Gartner hype cycle, and now the focus of every
industry is the ability to scale with minimal investment. Scalability comes with its own …

Data-dependency graph transformations for superblock scheduling

M Heffernan, K Wilken… - 2006 39th Annual IEEE …, 2006 - ieeexplore.ieee.org
The superblock is a scheduling region which exposes instruction level parallelism beyond
the basic block through speculative execution of instructions. In general, scheduling …

[PDF][PDF] 一种具有阅读器匿名功能的射频识别认证协议

谢润, 许春香, 陈文杰, **万鹏 - 电子与信息学报, 2015 - edit.jeit.ac.cn
在射频识别(RFID) 的应用中, 安全问题特别是用户隐私问题**日益凸显. 因此,(用户)
标签信息的隐私保护的需求越来越迫切. 在RFID 系统中, 标签的隐私保护不仅是对外部攻击者 …

[PDF][PDF] Improved Privacy-preserving Authorized Out Authentication Protocols.

J Zheng, F Zhang - Sensors & Materials, 2019 - sensors.myu-group.co.jp
With wide applications of the radio frequency identification (RFID) technology in areas such
as the supply chain, warehouse management, and so on, the privacy and security of RFID …

Proposed anonymous authentication scheme for academic service in the university

M Sudarma, NP Sastra… - 2017 IEEE International …, 2017 - ieeexplore.ieee.org
The paper discusses about anonymous authentication system for academic service in the
university. The anonymous authentication system is proposed to apply in the university to …