A secure and privacy friendly ECC based RFID authentication protocol for practical applications
Radio frequency identification (RFID) is a promising and widespread wireless
communication technology for entity identification or authentication. By the emerging Internet …
communication technology for entity identification or authentication. By the emerging Internet …
Highly efficient and re-executable private function evaluation with linear complexity
Private function evaluation aims to securely compute a function without leaking any
information other than what is revealed by the output, where is a private input of one of the …
information other than what is revealed by the output, where is a private input of one of the …
[PDF][PDF] Highly Efficient and Reusable Private Function Evaluation with Linear Complexity.
Private function evaluation aims to securely compute a function f (x1,..., xn) without leaking
any information other than what is revealed by the output, where f is a private input of one of …
any information other than what is revealed by the output, where f is a private input of one of …
A Secure Authentication Protocol for Cholesteric Spherical Reflectors Using Homomorphic Encryption
Sometimes fingerprint-like features are found in a material. The exciting discovery poses
new challenges on how to use the features to build an object authentication protocol that …
new challenges on how to use the features to build an object authentication protocol that …
[PDF][PDF] Security and privacy of RFID systems
A Arslan - 2019 - dspace.kocaeli.edu.tr
Radio Frequency IDentification (RFID) has become one of the most emerging wireless
technologies used in order to identify and authenticate objects, animals and people in recent …
technologies used in order to identify and authenticate objects, animals and people in recent …