Scalable, efficient, and secure RFID with elliptic curve cryptosystem for Internet of Things in healthcare environment

D Noori, H Shakeri, M Niazi Torshiz - EURASIP Journal on Information …, 2020 - Springer
The rapid development of IoT technology has led to the usage of various devices in our daily
life. Along with the ever-increasing rise of the Internet of Things, the use of appropriate …

A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing

Z Qin, J Sun, A Wahaballa, W Zheng, H Xiong… - Computer Standards & …, 2017 - Elsevier
Mobile wallet, also known as mobile payment, is becoming one of the most frequently used
approach to provide payment services under financial regulation via mobile device and may …

An efficient mutual authentication RFID scheme based on elliptic curve cryptography

JS Chou - The Journal of supercomputing, 2014 - Springer
Radio frequency identification (RFID) tags have been widely deployed in many applications,
such as supply chain management, inventory control, and traffic card payment. However …

Scalable RFID systems: a privacy-preserving protocol with constant-time identification

B Alomair, A Clark, J Cuellar… - IEEE Transactions on …, 2011 - ieeexplore.ieee.org
In RFID literature, most “privacy-preserving” protocols require the reader to search all tags in
the system in order to identify a single tag. In another class of protocols, the search …

A provably secure RFID authentication protocol based on elliptic curve for healthcare environments

MS Farash, O Nawaz, K Mahmood… - Journal of medical …, 2016 - Springer
To enhance the quality of healthcare in the management of chronic disease, telecare
medical information systems have increasingly been used. Very recently, Zhang and Qi (J …

Secure attribute-based search in RFID-based inventory control systems

R Doss, R Trujillo-Rasua, S Piramuthu - Decision Support Systems, 2020 - Elsevier
We develop a secure attribute-based search protocol for Radio Frequency Identification
(RFID) systems. This protocol can be used to simultaneously identify groups of items that …

Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography

MS Farash - The Journal of Supercomputing, 2014 - Springer
Radio frequency identification (RFID) is a wireless technology for automatic identification
and data capture. Security and privacy issues in the RFID systems have attracted much …

Private identification of subscribers in mobile networks: status and challenges

SF Mjolsnes, RF Olimid - IEEE Communications Magazine, 2019 - ieeexplore.ieee.org
The privacy of individuals in the context of mobile networks is crucial nowadays.
Nevertheless, too few improvements have been made over the years to secure the privacy of …

A potential weakness in RFID-based Internet-of-things systems

I Erguler - Pervasive and Mobile Computing, 2015 - Elsevier
In recent years, a large body of research has been devoted to the security and privacy of
RFID that is expected to become a critical component of IoT (Internet of Things). Most of …

Efficient authentication for mobile and pervasive computing

B Alomair, R Poovendran - IEEE Transactions on Mobile …, 2012 - ieeexplore.ieee.org
With today's technology, many applications rely on the existence of small devices that can
exchange information and form communication networks. In a significant portion of such …