Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
[PDF][PDF] OCTOPUS: An edge-fog mutual authentication scheme.
MH Ibrahim - Int. J. Netw. Secur., 2016 - academia.edu
Authentication is an important and challenging issue for the security of Fog computing since,
services are offered to massive-scale end users (Fog users or Edge) by front Fog servers (or …
services are offered to massive-scale end users (Fog users or Edge) by front Fog servers (or …
A secure privacy and authentication protocol for passive RFID tags
CH Wei, MS Hwang, AYH Chin - International Journal of …, 2017 - inderscienceonline.com
A privacy and authentication protocol (PAP) requires a tag to perform four simple operations
in mobile communications: comparing two numbers used to execute a hash function, storing …
in mobile communications: comparing two numbers used to execute a hash function, storing …
Outage capacity analysis for ambient backscatter communication systems
Ambient backscatter communication (AmBC) has become a promising technology to the
Internet of Things (IoT) due to its low cost and high energy-efficiency. Since the AmBC …
Internet of Things (IoT) due to its low cost and high energy-efficiency. Since the AmBC …
A lightweight RFID authentication protocol with confidentiality and anonymity
Z Shi, J Chen, S Chen, S Ren - 2017 IEEE 2nd Advanced …, 2017 - ieeexplore.ieee.org
Radio Frequency IDentification (RFID) is one of the most important sensing techniques for
Internet of Things (IoT) and RFID systems have been applied to various different fields. But …
Internet of Things (IoT) and RFID systems have been applied to various different fields. But …
[PDF][PDF] SE-H: Secure and efficient hash protocol for RFID system
S Nashwan - … Journal of Communication Networks and Information …, 2017 - researchgate.net
The Radio Frequency Identification (RFID) systems are suffered from the growing of security
vulnerabilities. In the RFID Applications, an attackers may exploit these vulnerabilities to …
vulnerabilities. In the RFID Applications, an attackers may exploit these vulnerabilities to …
Cryptanalysis of Kumar's remote user authentication scheme with smart card
One of the common necessity to have secret communication through Internet is to
authenticate the legality of users. The simplest and most popular authentication technique to …
authenticate the legality of users. The simplest and most popular authentication technique to …
An authentication protocol for lightweight NFC mobile sensors payment
TH Feng, MS Hwang, LW Syu - Informatica, 2016 - journals.sagepub.com
Following the White Paper HCE that Google released in August 2014, it was expected that
NFC mobile phone payment would cause a wave of security discussion. After all, Android …
NFC mobile phone payment would cause a wave of security discussion. After all, Android …
Two mutual authentication protocols based on zero-knowledge proofs for RFID systems
H Assidi, EB Ayebie, EM Souidi - … , South Korea, November 29-December 1 …, 2018 - Springer
RFID technology is becoming more useful and it is applied in various domains such as
inventory management, supply chain, logistics, control access, e-passport, e-health and …
inventory management, supply chain, logistics, control access, e-passport, e-health and …
RFID authentication protocols based on error-correcting codes: a survey
Code-based cryptography is a very promising research area. It allows the construction of
different cryptographic mechanisms (eg identification protocol, public-key cryptosystem …
different cryptographic mechanisms (eg identification protocol, public-key cryptosystem …
[PDF][PDF] A secure code-based authentication scheme for RFID systems
Two essential problems are still posed in terms of Radio Frequency Identification (RFID)
systems, including: security and limitation of resources. Recently, Li et al.'s proposed a …
systems, including: security and limitation of resources. Recently, Li et al.'s proposed a …