Single-chip implementation and evaluation of passive UHF RFID tag with hash-based mutual authentication

Y Li, S Mikami, D Watanabe, K Ohta… - Radio Frequency …, 2014 - ebooks.iospress.nl
This paper presents a single-chip implementation and evaluation of a passive ultra-high
frequency (UHF) RFID tag that uses hash-based mutual authentication protocol …

Software and hardware co-verification for privacy-enhanced passive UHF RFID tag

Y Li, T Naksone, K Sakiyama - 2014 IEEE International …, 2014 - ieeexplore.ieee.org
RFID system is one of the most important components for the construction of the Internet of
Things. The wireless communication between the tag reader and the RFID tag is based on …

Head pose normalization for recognition of human identities using color and depth data

F Gossen - … Applications of Formal Methods, Verification, and …, 2016 - Springer
When using today's admission control systems some kind of interaction is generally
required. The idea of this work was to approach identification in a contact-less manner and …

Enhancing the security of RCIA ultra-lightweight authentication protocol by using Random Number Generator (RNG) technique

SA Yasear, NH Zakaria, MN Omar - Journal of Telecommunication …, 2017 - jtec.utem.edu.my
This study is an attempt to enhance the security of Robust Confidentiality, Integrity, and
Authentication (RCIA) ultra-lightweight authentication protocols. In the RCIA protocol, IDs …