An efficient mutual authentication RFID scheme based on elliptic curve cryptography

JS Chou - The Journal of supercomputing, 2014 - Springer
Radio frequency identification (RFID) tags have been widely deployed in many applications,
such as supply chain management, inventory control, and traffic card payment. However …

Integrated system for control and monitoring industrial wireless networks for labor risk prevention

JR Gisbert, C Palau, M Uriarte, G Prieto… - Journal of Network and …, 2014 - Elsevier
Abstract The FASyS (Absolutely Safe and Healthy Factory) project, aligned with the
European Factories of the Future (FoF) concept, has been set-up to develop a new factory …

ECC-based untraceable authentication for large-scale active-tag RFID systems

Y Chen, JS Chou - Electronic Commerce Research, 2015 - Springer
Radio frequency identification tag authentication protocols are generally classified as non-
full-fledged and full-fledged, according to the resource usage of the tags. The non-full …

New directions for pervasive computing in logistics

C Marinagi, P Belsis, C Skourlas - Procedia-Social and Behavioral …, 2013 - Elsevier
This paper investigates the new trends in the field of “pervasive” or “ubiquitous” computing in
logistics. Over the past two decades, research challenges in pervasive computing have …

Towards secure and usable certificate-based authentication system using a secondary device for an industrial internet of things

J Choi, J Cho, H Kim, S Hyun - Applied Sciences, 2020 - mdpi.com
As the number of controllers and devices increases in Industrial Internet of Things (IIoT)
applications, it is essential to provide a secure and usable user authentication system for …

Shatter: Using threshold cryptography to protect single users with multiple devices

E Atwater, U Hengartner - Proceedings of the 9th ACM conference on …, 2016 - dl.acm.org
The average computer user is no longer restricted to one device. They may have several
devices and expect their applications to work on all of them. A challenge arises when these …

Collaborative authentication using threshold cryptography

A Abidin, A Aly, MA Mustafa - Emerging Technologies for Authorization …, 2020 - Springer
We propose a collaborative authentication protocol where multiple user devices (eg, a
smartphone, a smartwatch and a wristband) collaborate to authenticate the user to a third …

A novel framework for secure file transmission using modified AES and MD5 algorithms

R Kumar, G Mahajan - International Journal of Information …, 2015 - inderscienceonline.com
With the tremendous growth of sensitive information on the internet, the security is getting
more and more important than even before. However, the growth of users has unfortunately …

Frictionless authentication system: Security & privacy analysis and potential solutions

MA Mustafa, A Abidin, EA Rúa - arxiv preprint arxiv:1802.07231, 2018 - arxiv.org
This paper proposes a frictionless authentication system, provides a comprehensive security
analysis of and proposes potential solutions for this system. It first presents a system that …

Frictionless authentication systems: emerging trends, Research challenges and opportunities

V Rimmer, D Preuveneers, W Joosen… - arxiv preprint arxiv …, 2018 - arxiv.org
Authentication and authorization are critical security layers to protect a wide range of online
systems, services and content. However, the increased prevalence of wearable and mobile …