Conditional privacy preserving security protocol for NFC applications

H Eun, H Lee, H Oh - IEEE Transactions on Consumer …, 2013 - ieeexplore.ieee.org
In recent years, various mobile terminals equipped with NFC (Near Field Communication)
have been released. The combination of NFC with smart devices has led to widening the …

SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms

V Odelu, AK Das, A Goswami - IEEE Transactions on …, 2016 - ieeexplore.ieee.org
Authentication protocol plays an important role in the short-range wireless communications
for the Near Field Communication (NFC) technology. Due to the shared nature of wireless …

Secure pseudonym-based near field communication protocol for the consumer internet of things

D He, N Kumar, JH Lee - IEEE Transactions on Consumer …, 2015 - ieeexplore.ieee.org
Near Field Communication (NFC) has been used for short range communications in a
number of applications for consumer electronics devices. Specifically, NFC has been used …

[HTML][HTML] D-PMIPv6: A distributed mobility management scheme supported by data and control plane separation

L Yi, H Zhou, D Huang, H Zhang - Mathematical and Computer Modelling, 2013 - Elsevier
Over the past few years, modern mobile subscriber devices such as Smartphones, tablets
and PDAs have become more and more popular which use network resources in a more …

Optimized combination model and algorithm of parking guidance information configuration

Z Mei, Y Tian - EURASIP Journal on Wireless Communications and …, 2011 - Springer
Operators of parking guidance and information (PGI) systems often have difficulty in
providing the best car park availability information to drivers in periods of high demand. A …

[PDF][PDF] An Improved Privacy Protection Security Protocol Based on NFC.

J Ling, Y Wang, W Chen - Int. J. Netw. Secur., 2017 - ijns.jalaxy.com.tw
An improved NFC-based privacy protection protocol is proposed to protect user's privacy in
NFC application. In this paper, user's privacy is protected by Chebyshevmap and …

Cross-layered architecture for securing IPv6 ITS communication: example of pseudonym change

JH Lee, T Ernst, JM Bonnin - 2011 Third International …, 2011 - ieeexplore.ieee.org
Recent technical breakthroughs in communications have facilitated a cross-layered
communication architecture for Intelligent Transportation Systems (ITS) aiming at …

IPv6 security issues in cooperative intelligent transportation systems

JH Lee, T Ernst - The Computer Journal, 2013 - ieeexplore.ieee.org
Cooperative Intelligent Transportation Systems (ITS) will turn up to us with safer and more
efficient driving environments as well as convenient and infotainment features for future ITS …

Towards an IPsec security GeoNet architecture

NA Sahloul, L Benazzouz… - 2012 Third International …, 2012 - ieeexplore.ieee.org
In order to connect Vehicle Ad-hoc NETworks (VANETs) to the Internet, most of
manufactures car consortia and standardization bodies (IEEE 1609, CALM, C2C-CC, and …

[PDF][PDF] Group Communication Using-A Dynamic Key Generation Protocol

BT Geetha, MV Srinath, V Perumal - International Journal, 2014 - academia.edu
The objective of this paper is to generate a dynamic key protocol to achieve the group
communication using the Key Generation Centre and prevent possible attacks in …