VADE: a virtual assembly design environment

S Jayaram, U Jayaram, Y Wang… - IEEE computer …, 1999 - ieeexplore.ieee.org
Virtual Assembly Design Environment (VADE) resulted from a research and development
project started in 1995, sponsored by the National Institute of Standards and Technology …

Lightweight RFID authentication with forward and backward security

M Burmester, J Munilla - ACM Transactions on Information and System …, 2011 - dl.acm.org
We propose a lightweight RFID authentication protocol that supports forward and backward
security. The only cryptographic mechanism that this protocol uses is a pseudorandom …

Technique for preventing DoS attacks on RFID systems

D Tagra, M Rahman, S Sampalli - SoftCOM 2010, 18th …, 2010 - ieeexplore.ieee.org
RFID systems are vulnerable to many types of malicious attacks, ranging from passive
eavesdrop** to complete denial of service (DoS). Hence it is becoming increasingly …

[PDF][PDF] A flyweight RFID authentication protocol

M Burmester, J Munilla - Cryptology ePrint Archive, 2009 - Citeseer
We propose a lightweight RFID authentication protocol that supports forward and backward
security. The only cryptographic mechanism that this protocol uses is a pseudo-random …

Costs of authentic pharmaceuticals: research on qualitative and quantitative aspects of enabling anti-counterfeiting in RFID-aided supply chains

MP Schapranow, J Müller, A Zeier… - Personal and Ubiquitous …, 2012 - Springer
The pharmaceutical industry suffers from steadily increasing counterfeit rates. RFID
technology is named as a foundation for an integer and counterfeit-resistant pharmaceutical …

An ict-based border security framework: a case study in indian perspective

SK Katara, A Pokhriyal - … of the 10th International Conference on Theory …, 2017 - dl.acm.org
The secure border management is a complex process when it comes to cross border
transportation. The lack of visibility of operations at ground level results in long delays at …

Low-cost mutual RFID authentication model using predefined password lists

MP Schapranow, J Müller, S Enderlein… - 2009 16th …, 2009 - ieeexplore.ieee.org
The use of RFID tags for storing unique identifiers increases the complexity of existing global
supply chains. Companies participating in this RFID-aided supply chains are confronted with …

Strengthening Indian Border Security through Integrated ICT based Framework

SK Katara, A Pokhriyal - Proceedings of the Special Collection on …, 2017 - dl.acm.org
Border security management is a vital issue in Indian perspective because India shares its
border with six countries--Bangladesh, China, Pakistan, Nepal, Bhutan and Myanmar. All …

Emulation based fault injection on UHF RFID transponder

O Abdelmalek, D Hely… - … Symposium on Design and …, 2014 - ieeexplore.ieee.org
RFID tags are increasingly used for critical applications within harsh environments or for
secure applications such as identification, counterfeiting protection... However, such low cost …

An approach to solve tracking and message blocking problems in RFID

AK Singh, S Dhal, I Sengupta - 2014 Fourth International …, 2014 - ieeexplore.ieee.org
The popularity of Radio Frequency Identification (RFID) in various applications is due to its
low cost. The low cost comes with the compromise in hardware used in its implementation …