Novel ECC-based RFID mutual authentication protocol for emerging IoT applications
The implementation of RFID technology has globally impacted several industries and this
revolution has improved the aspects of service delivery in many sectors, such as logistics …
revolution has improved the aspects of service delivery in many sectors, such as logistics …
Analysis on security and privacy guidelines: RFID-based IoT applications
The Internet of Things (IoT) comprises many technologies, among them is Radio Frequency
Identification (RFID), which can be used to track single or multiple objects. This technology …
Identification (RFID), which can be used to track single or multiple objects. This technology …
Constructing effective lightweight privacy protection in RFID-based systems
PJ Chuang, YF Tu - The Journal of Supercomputing, 2021 - Springer
RFID systems usually involve passive tags (with limited computing and storage capacity) to
secure data exchange via wireless communication. This paper builds an effective …
secure data exchange via wireless communication. This paper builds an effective …
Enhancing the Security of ISO/IEC 14443-3 and 4 RFID Authentication Protocols through Formal Analysis
L Pankaczi, M Eldefrawy - 2023 IEEE International Conference …, 2023 - ieeexplore.ieee.org
Due to cyber attacks targeting RFID systems, this paper briefly summarizes parts 3 and 4 of
the ISO/IEC 14443 standard, which specify the initialization, selection, and trans-mission …
the ISO/IEC 14443 standard, which specify the initialization, selection, and trans-mission …
Analysis of Integrated Lecturing Event Recording System Based on Radio Frequency Identification (RFID) with Rapid Application Development (RAD) Model
The improvement of the student learning process in higher education is of course
determined by technological developments. semiconductor technology that can be …
determined by technological developments. semiconductor technology that can be …
[PDF][PDF] Analisis Formal Lightweight Mutual Authentication RFID Protocol Menggunakan Scyther
DPA Kusuma, AD Handayani - academia.edu
Salah satu faktor penting dalam protokol komunikasi adalah adanya autentikasi. Autentikasi
merupakan suatu metode untuk memastikan bahwa entitas yang berkomunikasi merupakan …
merupakan suatu metode untuk memastikan bahwa entitas yang berkomunikasi merupakan …