Systematic mapping study on RFID technology
Radio Frequency Identification (RFID) is a technology that not only serves to identify objects
but also communicates other information, allowing the real-time monitoring of objects at …
but also communicates other information, allowing the real-time monitoring of objects at …
A privacy-preserving code-based authentication protocol for Internet of Things
N Chikouche, PL Cayrel, EHM Mboup… - The Journal of …, 2019 - Springer
Abstract The Internet of Things (IoT) is an upcoming technology that permits to interconnect
different devices and machines using heterogeneous networks. One of the most critical …
different devices and machines using heterogeneous networks. One of the most critical …
Double verification protocol via secret sharing for low-cost RFID tags
Y Liu, MF Ezerman, H Wang - Future Generation Computer Systems, 2019 - Elsevier
RFID tags have become ubiquitous and cheaper to implement. It is often imperative to
design ultralightweight authentication protocols for such tags. Many existing protocols still …
design ultralightweight authentication protocols for such tags. Many existing protocols still …
Double watermarking‐based biometric access control for radio frequency identification card
L Rzouga Haddada… - International Journal of …, 2019 - Wiley Online Library
The integration of data privacy and security into radio frequency identification (RFID)
technology, particularly into RFID tags, has become one of the most attractive research …
technology, particularly into RFID tags, has become one of the most attractive research …
Performance evaluation of post-quantum public-key cryptography in smart mobile devices
N Chikouche, A Ghadbane - Conference on e-Business, e-Services and e …, 2018 - Springer
The classical public-key schemes are based on number theory, such as integer factorization
and discrete logarithm. In 1994, PW Shor proposed an algorithm to solve these problems in …
and discrete logarithm. In 1994, PW Shor proposed an algorithm to solve these problems in …
[PDF][PDF] Eap-sres: An enhanced authentication protocol for secure remote education systems using nfc technology
N Chikouche, F Cherif - … Journal of Computing and Digital Systems, 2020 - researchgate.net
Radio Frequency Identification (RFID) and Near Field Communication (NFC) are wireless
technologies applied in several domains, among which, remote education. The …
technologies applied in several domains, among which, remote education. The …
Refining Mosca's Theorem: Risk Management Model for the Quantum Threat Applied to IoT Protocol Security
M Kiviharju - Cyber Security: Critical Infrastructure Protection, 2022 - Springer
Large-scale quantum computation (QC) presents a serious threat to many modern
cryptographic primitives. This has profound implications to the critical information …
cryptographic primitives. This has profound implications to the critical information …
A comparative analysis of RFID authentication protocols for healthcare applications
AN Bahache, N Chikouche - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Radio frequency identifications (RFID) are a special kind of wireless technology. They offer
intelligent communication solutions for healthcare applications. The main component of …
intelligent communication solutions for healthcare applications. The main component of …