Systematic mapping study on RFID technology

A Haibi, K Oufaska, K El Yassini, M Boulmalf… - IEEE …, 2022 - ieeexplore.ieee.org
Radio Frequency Identification (RFID) is a technology that not only serves to identify objects
but also communicates other information, allowing the real-time monitoring of objects at …

A privacy-preserving code-based authentication protocol for Internet of Things

N Chikouche, PL Cayrel, EHM Mboup… - The Journal of …, 2019 - Springer
Abstract The Internet of Things (IoT) is an upcoming technology that permits to interconnect
different devices and machines using heterogeneous networks. One of the most critical …

Double verification protocol via secret sharing for low-cost RFID tags

Y Liu, MF Ezerman, H Wang - Future Generation Computer Systems, 2019 - Elsevier
RFID tags have become ubiquitous and cheaper to implement. It is often imperative to
design ultralightweight authentication protocols for such tags. Many existing protocols still …

Double watermarking‐based biometric access control for radio frequency identification card

L Rzouga Haddada… - International Journal of …, 2019 - Wiley Online Library
The integration of data privacy and security into radio frequency identification (RFID)
technology, particularly into RFID tags, has become one of the most attractive research …

Performance evaluation of post-quantum public-key cryptography in smart mobile devices

N Chikouche, A Ghadbane - Conference on e-Business, e-Services and e …, 2018 - Springer
The classical public-key schemes are based on number theory, such as integer factorization
and discrete logarithm. In 1994, PW Shor proposed an algorithm to solve these problems in …

[PDF][PDF] Eap-sres: An enhanced authentication protocol for secure remote education systems using nfc technology

N Chikouche, F Cherif - … Journal of Computing and Digital Systems, 2020 - researchgate.net
Radio Frequency Identification (RFID) and Near Field Communication (NFC) are wireless
technologies applied in several domains, among which, remote education. The …

Refining Mosca's Theorem: Risk Management Model for the Quantum Threat Applied to IoT Protocol Security

M Kiviharju - Cyber Security: Critical Infrastructure Protection, 2022 - Springer
Large-scale quantum computation (QC) presents a serious threat to many modern
cryptographic primitives. This has profound implications to the critical information …

A comparative analysis of RFID authentication protocols for healthcare applications

AN Bahache, N Chikouche - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Radio frequency identifications (RFID) are a special kind of wireless technology. They offer
intelligent communication solutions for healthcare applications. The main component of …