Scalable, efficient, and secure RFID with elliptic curve cryptosystem for Internet of Things in healthcare environment
D Noori, H Shakeri, M Niazi Torshiz - EURASIP Journal on Information …, 2020 - Springer
The rapid development of IoT technology has led to the usage of various devices in our daily
life. Along with the ever-increasing rise of the Internet of Things, the use of appropriate …
life. Along with the ever-increasing rise of the Internet of Things, the use of appropriate …
A secure and privacy-preserving mobile wallet with outsourced verification in cloud computing
Mobile wallet, also known as mobile payment, is becoming one of the most frequently used
approach to provide payment services under financial regulation via mobile device and may …
approach to provide payment services under financial regulation via mobile device and may …
An efficient mutual authentication RFID scheme based on elliptic curve cryptography
JS Chou - The Journal of supercomputing, 2014 - Springer
Radio frequency identification (RFID) tags have been widely deployed in many applications,
such as supply chain management, inventory control, and traffic card payment. However …
such as supply chain management, inventory control, and traffic card payment. However …
Scalable RFID systems: a privacy-preserving protocol with constant-time identification
In RFID literature, most “privacy-preserving” protocols require the reader to search all tags in
the system in order to identify a single tag. In another class of protocols, the search …
the system in order to identify a single tag. In another class of protocols, the search …
A provably secure RFID authentication protocol based on elliptic curve for healthcare environments
To enhance the quality of healthcare in the management of chronic disease, telecare
medical information systems have increasingly been used. Very recently, Zhang and Qi (J …
medical information systems have increasingly been used. Very recently, Zhang and Qi (J …
Secure attribute-based search in RFID-based inventory control systems
R Doss, R Trujillo-Rasua, S Piramuthu - Decision Support Systems, 2020 - Elsevier
We develop a secure attribute-based search protocol for Radio Frequency Identification
(RFID) systems. This protocol can be used to simultaneously identify groups of items that …
(RFID) systems. This protocol can be used to simultaneously identify groups of items that …
Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography
MS Farash - The Journal of Supercomputing, 2014 - Springer
Radio frequency identification (RFID) is a wireless technology for automatic identification
and data capture. Security and privacy issues in the RFID systems have attracted much …
and data capture. Security and privacy issues in the RFID systems have attracted much …
Private identification of subscribers in mobile networks: status and challenges
SF Mjolsnes, RF Olimid - IEEE Communications Magazine, 2019 - ieeexplore.ieee.org
The privacy of individuals in the context of mobile networks is crucial nowadays.
Nevertheless, too few improvements have been made over the years to secure the privacy of …
Nevertheless, too few improvements have been made over the years to secure the privacy of …
A potential weakness in RFID-based Internet-of-things systems
I Erguler - Pervasive and Mobile Computing, 2015 - Elsevier
In recent years, a large body of research has been devoted to the security and privacy of
RFID that is expected to become a critical component of IoT (Internet of Things). Most of …
RFID that is expected to become a critical component of IoT (Internet of Things). Most of …
Efficient authentication for mobile and pervasive computing
B Alomair, R Poovendran - IEEE Transactions on Mobile …, 2012 - ieeexplore.ieee.org
With today's technology, many applications rely on the existence of small devices that can
exchange information and form communication networks. In a significant portion of such …
exchange information and form communication networks. In a significant portion of such …