Conditional privacy preserving security protocol for NFC applications
In recent years, various mobile terminals equipped with NFC (Near Field Communication)
have been released. The combination of NFC with smart devices has led to widening the …
have been released. The combination of NFC with smart devices has led to widening the …
SEAP: Secure and efficient authentication protocol for NFC applications using pseudonyms
Authentication protocol plays an important role in the short-range wireless communications
for the Near Field Communication (NFC) technology. Due to the shared nature of wireless …
for the Near Field Communication (NFC) technology. Due to the shared nature of wireless …
Secure pseudonym-based near field communication protocol for the consumer internet of things
Near Field Communication (NFC) has been used for short range communications in a
number of applications for consumer electronics devices. Specifically, NFC has been used …
number of applications for consumer electronics devices. Specifically, NFC has been used …
[HTML][HTML] D-PMIPv6: A distributed mobility management scheme supported by data and control plane separation
L Yi, H Zhou, D Huang, H Zhang - Mathematical and Computer Modelling, 2013 - Elsevier
Over the past few years, modern mobile subscriber devices such as Smartphones, tablets
and PDAs have become more and more popular which use network resources in a more …
and PDAs have become more and more popular which use network resources in a more …
Optimized combination model and algorithm of parking guidance information configuration
Z Mei, Y Tian - EURASIP Journal on Wireless Communications and …, 2011 - Springer
Operators of parking guidance and information (PGI) systems often have difficulty in
providing the best car park availability information to drivers in periods of high demand. A …
providing the best car park availability information to drivers in periods of high demand. A …
[PDF][PDF] An Improved Privacy Protection Security Protocol Based on NFC.
J Ling, Y Wang, W Chen - Int. J. Netw. Secur., 2017 - ijns.jalaxy.com.tw
An improved NFC-based privacy protection protocol is proposed to protect user's privacy in
NFC application. In this paper, user's privacy is protected by Chebyshevmap and …
NFC application. In this paper, user's privacy is protected by Chebyshevmap and …
Cross-layered architecture for securing IPv6 ITS communication: example of pseudonym change
Recent technical breakthroughs in communications have facilitated a cross-layered
communication architecture for Intelligent Transportation Systems (ITS) aiming at …
communication architecture for Intelligent Transportation Systems (ITS) aiming at …
IPv6 security issues in cooperative intelligent transportation systems
JH Lee, T Ernst - The Computer Journal, 2013 - ieeexplore.ieee.org
Cooperative Intelligent Transportation Systems (ITS) will turn up to us with safer and more
efficient driving environments as well as convenient and infotainment features for future ITS …
efficient driving environments as well as convenient and infotainment features for future ITS …
Towards an IPsec security GeoNet architecture
NA Sahloul, L Benazzouz… - 2012 Third International …, 2012 - ieeexplore.ieee.org
In order to connect Vehicle Ad-hoc NETworks (VANETs) to the Internet, most of
manufactures car consortia and standardization bodies (IEEE 1609, CALM, C2C-CC, and …
manufactures car consortia and standardization bodies (IEEE 1609, CALM, C2C-CC, and …
[PDF][PDF] Group Communication Using-A Dynamic Key Generation Protocol
The objective of this paper is to generate a dynamic key protocol to achieve the group
communication using the Key Generation Centre and prevent possible attacks in …
communication using the Key Generation Centre and prevent possible attacks in …