A secure and privacy friendly ECC based RFID authentication protocol for practical applications

A Arslan, SA Çolak, S Ertürk - Wireless Personal Communications, 2021 - Springer
Radio frequency identification (RFID) is a promising and widespread wireless
communication technology for entity identification or authentication. By the emerging Internet …

Highly efficient and re-executable private function evaluation with linear complexity

O Biçer, MA Bingöl, MS Kiraz… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Private function evaluation aims to securely compute a function without leaking any
information other than what is revealed by the output, where is a private input of one of the …

[PDF][PDF] Highly Efficient and Reusable Private Function Evaluation with Linear Complexity.

O Bicer, MA Bingöl, MS Kiraz, A Levi - IACR Cryptol. ePrint Arch., 2018 - researchgate.net
Private function evaluation aims to securely compute a function f (x1,..., xn) without leaking
any information other than what is revealed by the output, where f is a private input of one of …

A Secure Authentication Protocol for Cholesteric Spherical Reflectors Using Homomorphic Encryption

MP Arenas, MA Bingol, H Demirci, G Fotiadis… - … on Cryptology in Africa, 2022 - Springer
Sometimes fingerprint-like features are found in a material. The exciting discovery poses
new challenges on how to use the features to build an object authentication protocol that …

[PDF][PDF] Security and privacy of RFID systems

A Arslan - 2019 - dspace.kocaeli.edu.tr
Radio Frequency IDentification (RFID) has become one of the most emerging wireless
technologies used in order to identify and authenticate objects, animals and people in recent …