An efficient mutual authentication RFID scheme based on elliptic curve cryptography
JS Chou - The Journal of supercomputing, 2014 - Springer
Radio frequency identification (RFID) tags have been widely deployed in many applications,
such as supply chain management, inventory control, and traffic card payment. However …
such as supply chain management, inventory control, and traffic card payment. However …
Integrated system for control and monitoring industrial wireless networks for labor risk prevention
Abstract The FASyS (Absolutely Safe and Healthy Factory) project, aligned with the
European Factories of the Future (FoF) concept, has been set-up to develop a new factory …
European Factories of the Future (FoF) concept, has been set-up to develop a new factory …
ECC-based untraceable authentication for large-scale active-tag RFID systems
Y Chen, JS Chou - Electronic Commerce Research, 2015 - Springer
Radio frequency identification tag authentication protocols are generally classified as non-
full-fledged and full-fledged, according to the resource usage of the tags. The non-full …
full-fledged and full-fledged, according to the resource usage of the tags. The non-full …
New directions for pervasive computing in logistics
This paper investigates the new trends in the field of “pervasive” or “ubiquitous” computing in
logistics. Over the past two decades, research challenges in pervasive computing have …
logistics. Over the past two decades, research challenges in pervasive computing have …
Towards secure and usable certificate-based authentication system using a secondary device for an industrial internet of things
As the number of controllers and devices increases in Industrial Internet of Things (IIoT)
applications, it is essential to provide a secure and usable user authentication system for …
applications, it is essential to provide a secure and usable user authentication system for …
Shatter: Using threshold cryptography to protect single users with multiple devices
The average computer user is no longer restricted to one device. They may have several
devices and expect their applications to work on all of them. A challenge arises when these …
devices and expect their applications to work on all of them. A challenge arises when these …
Collaborative authentication using threshold cryptography
We propose a collaborative authentication protocol where multiple user devices (eg, a
smartphone, a smartwatch and a wristband) collaborate to authenticate the user to a third …
smartphone, a smartwatch and a wristband) collaborate to authenticate the user to a third …
A novel framework for secure file transmission using modified AES and MD5 algorithms
R Kumar, G Mahajan - International Journal of Information …, 2015 - inderscienceonline.com
With the tremendous growth of sensitive information on the internet, the security is getting
more and more important than even before. However, the growth of users has unfortunately …
more and more important than even before. However, the growth of users has unfortunately …
Frictionless authentication system: Security & privacy analysis and potential solutions
This paper proposes a frictionless authentication system, provides a comprehensive security
analysis of and proposes potential solutions for this system. It first presents a system that …
analysis of and proposes potential solutions for this system. It first presents a system that …
Frictionless authentication systems: emerging trends, Research challenges and opportunities
Authentication and authorization are critical security layers to protect a wide range of online
systems, services and content. However, the increased prevalence of wearable and mobile …
systems, services and content. However, the increased prevalence of wearable and mobile …