An analysis of RFID authentication schemes for internet of things in healthcare environment using elliptic curve cryptography
D He, S Zeadally - IEEE internet of things journal, 2014 - ieeexplore.ieee.org
Advances in information and communication technologies have led to the emergence of
Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings …
Internet of Things (IoT). In the healthcare environment, the use of IoT technologies brings …
Elliptic curve-based RFID/NFC authentication with temperature sensor input for relay attacks
P Urien, S Piramuthu - Decision Support Systems, 2014 - Elsevier
Unless specifically designed for its prevention, none of the existing RFID authentication
protocols are immune to relay attacks. Relay attacks generally involve the presence of one …
protocols are immune to relay attacks. Relay attacks generally involve the presence of one …
An elliptic curve-based mutual authentication scheme for RFID implant systems
In this paper, a secure mutual authentication scheme for an RFID implant system is
developed. An insecure communication channel between a tag and a reader makes the …
developed. An insecure communication channel between a tag and a reader makes the …
[PDF][PDF] A Lightweight RFID Security Protocol Based on Elliptic Curve Crytography.
Q Qian, YL Jia, R Zhang - Int. J. Netw. Secur., 2016 - ijns.jalaxy.com.tw
Abstract Radio Frequency Identification (RFID) is a promising new technology that is widely
deployed for object tracking and monitoring, ticketing, supply-chain management …
deployed for object tracking and monitoring, ticketing, supply-chain management …
RFID ownership transfer protocol based on cloud
T Cao, X Chen, R Doss, J Zhai, LJ Wise, Q Zhao - Computer Networks, 2016 - Elsevier
RFID and Cloud computing are widely used in the IoT (Internet of Things). However, there
are few research works which combine RFID ownership transfer schemes with Cloud …
are few research works which combine RFID ownership transfer schemes with Cloud …
[PDF][PDF] A Lightweight RFID Authentication Protocol based on Elliptic Curve Cryptography.
Y Liu, X Qin, C Wang, B Li - J. Comput., 2013 - jcomputers.us
The security and privacy of the tag carrier has become the bottle neck of Radio Frequency
Identification (RFID) system development further. In this paper, we propose a robust …
Identification (RFID) system development further. In this paper, we propose a robust …
Framework and authentication protocols for smartphone, NFC, and RFID in retail transactions
P Urien, S Piramuthu - 2013 IEEE Eighth International …, 2013 - ieeexplore.ieee.org
As automation gains increasing popularity in supply chains and retail stores for processes
such as inventory management, there is an increasing interest in automating processes in …
such as inventory management, there is an increasing interest in automating processes in …
Authentication protocol for securing internet of things
A Maarof, M Senhadji, Z Labbi… - Proceedings of the Fourth …, 2018 - dl.acm.org
The Internet of things (IoT) is become an important research topic because it integrates
various sensors and objects to communicate directly with one another object without human …
various sensors and objects to communicate directly with one another object without human …
A hierarchical anti-counterfeit mechanism: securing the supply chain using RFIDs
Z Bilal, K Martin - Foundations and Practice of Security: 6th International …, 2014 - Springer
Counterfeiting is a very serious threat to supply chain management systems. RFID systems
are widely used to automate and speed up the process of remotely identifying products …
are widely used to automate and speed up the process of remotely identifying products …
LLCPS and SISO: A TLS-based framework with RFID for NFC P2P retail transaction processing
P Urien, S Piramuthu - 2013 IEEE International Conference on …, 2013 - ieeexplore.ieee.org
The introduction of smartphones enabled with Near Field Communication (NFC) technology
facilitates transformation of processes that involve manual intervention such as payment …
facilitates transformation of processes that involve manual intervention such as payment …