A survey of RFID authentication protocols
RFID are small wireless devices which can be used for identification of objects and humans as well. Their acceptance has grown in past years and is expected to grow further. Due to reduction in cost of production RFID devices are being deployed in large numbers in supply chains (by Wal-Mart, etc.) I...
| Main Authors: | Yousuf, Y., Potdar, Vidyasagar |
|---|---|
| Format: | Conference Paper |
| Published: |
IEEE Computer Society
2008
|
| Online Access: | http://hdl.handle.net/20.500.11937/20692 |
Similar Items
RFID mutual authentication protocols for tags and readers with and without a server
by: Han, Song, et al.
Published: (2013)
by: Han, Song, et al.
Published: (2013)
Mutual authentication protocol for RFID tags based on synchronised secret information with monitor
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
A critical analysis of RFID security protocols
by: Sharif, A., et al.
Published: (2008)
by: Sharif, A., et al.
Published: (2008)
Applications for RFID in pharmaceutical industry
by: Potdar, M., et al.
Published: (2006)
by: Potdar, M., et al.
Published: (2006)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Anonymous mutual authentication protocol for RFID tag without back-end database
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Tamper detection in RFID tags, using, fragile watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
RFID technology and its industrial applications
by: Potdar, Vidyasagar, et al.
Published: (2016)
by: Potdar, Vidyasagar, et al.
Published: (2016)
Automated Data Capture Technologies: RFID
by: Potdar, Vidyasagar, et al.
Published: (2007)
by: Potdar, Vidyasagar, et al.
Published: (2007)
Tamper detection for ubiquitous RFID-enabled supply chain
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Mutual Authentication Protocol Model For Low-Cost RFID Systems Based On Shelled Random Value
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
Recovering and restoring tampered RFID data using steganographic principles
by: Mohan, M., et al.
Published: (2006)
by: Mohan, M., et al.
Published: (2006)
Improving RFID read rate reliability by a systemic error detection approach
by: Potdar, Vidyasagar, et al.
Published: (2007)
by: Potdar, Vidyasagar, et al.
Published: (2007)
A RFID Protocol For Detecting The Existence Of A Single RFID Tag By Two RFID Readers
by: Tan , Aik Theng
Published: (2012)
by: Tan , Aik Theng
Published: (2012)
Business sustainability frameworks a survey
by: Sambhanthan, A., et al.
Published: (2016)
by: Sambhanthan, A., et al.
Published: (2016)
Wireless Sensor Network transport protocol: A critical review
by: Rathnayaka, Dinusha, et al.
Published: (2011)
by: Rathnayaka, Dinusha, et al.
Published: (2011)
A framework of authentication and authorization for e-health services
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
URASP: an ultralightweight RFID authentication scheme using permutation operation
by: Mohd Shariq, et al.
Published: (2021)
by: Mohd Shariq, et al.
Published: (2021)
LCART: A Cross-layered Transport Protocol for Heterogeneous WSN
by: Sharif, Atif, et al.
Published: (2010)
by: Sharif, Atif, et al.
Published: (2010)
A survey of Western Australian Software Businesses an exlporative web content analysis
by: Sambhanthan, A., et al.
Published: (2016)
by: Sambhanthan, A., et al.
Published: (2016)
A survey of digital image watermarking techniques
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Wireless multimedia sensor networks: a survey
by: Potdar, Vidyasagar, et al.
Published: (2009)
by: Potdar, Vidyasagar, et al.
Published: (2009)
A survey of awareness, knowledge and perception of online spam
by: Ridzuan, F., et al.
Published: (2012)
by: Ridzuan, F., et al.
Published: (2012)
A survey of revenue sharing social software's systems
by: Chai, Kevin, et al.
Published: (2007)
by: Chai, Kevin, et al.
Published: (2007)
Wireless multimedia sensor network technology: a survey
by: Sharif, Atif, et al.
Published: (2009)
by: Sharif, Atif, et al.
Published: (2009)
New framework for authentication and authorization for e-health service systems
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Priority Enabled Transport Layer Protocol for Wireless Sensor Network
by: Sharif, Atif, et al.
Published: (2010)
by: Sharif, Atif, et al.
Published: (2010)
An authentication protocol for mobile cellular network
by: Mohammed, Lawan Ahmed, et al.
Published: (2002)
by: Mohammed, Lawan Ahmed, et al.
Published: (2002)
Authentication-chains: blockchain-inspired lightweight authentication protocol for IoT networks
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023)
by: Al Ahmed, Mahmoud Tayseer, et al.
Published: (2023)
Wireless Sensor Network Transport Protocol - A State of the Art
by: Rathnayaka, Dinusha, et al.
Published: (2010)
by: Rathnayaka, Dinusha, et al.
Published: (2010)
LCART: Lightweight Congestion Aware Reliable Transport Protocol for WSN Targeting Heterogeneous Traffic
by: Sharif, Atif, et al.
Published: (2010)
by: Sharif, Atif, et al.
Published: (2010)
Zero knowledge protocol network authentication and monitoring
by: Ang, Yong Seng
Published: (2024)
by: Ang, Yong Seng
Published: (2024)
Efficient authentication and re-authentication protocols for 4G/5G heterogeneous networks
by: Alezabi, Kamal Ali, et al.
Published: (2020)
by: Alezabi, Kamal Ali, et al.
Published: (2020)
A Method For Estimating Rfid Protocol Execution Time Based On Flowgraph Model
by: Tan, Aik Theng
Published: (2021)
by: Tan, Aik Theng
Published: (2021)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
Enhancement of Security Architecture for Smartcard Based Authentication Protocols
by: Mohammed, Lawan Ahmed
Published: (2004)
by: Mohammed, Lawan Ahmed
Published: (2004)
Performance evaluation of different transport layer protocols on the IEEE 802.11 and IEEE 802.15.4 MAC/PHY layers for WSN
by: Sharif, Atif, et al.
Published: (2009)
by: Sharif, Atif, et al.
Published: (2009)
Dependency of Transport Functions on IEEE802.11 and IEEE802.15.4 MAC/PHY Layer Protocols for WSN: A Step towards Cross-Layer Design
by: Sharif, Atif, et al.
Published: (2010)
by: Sharif, Atif, et al.
Published: (2010)
ERCTP: End-to-end reliable and congestion aware transport layer protocol for heterogeneous WSN
by: Sharif, Atif, et al.
Published: (2010)
by: Sharif, Atif, et al.
Published: (2010)
Similar Items
-
RFID mutual authentication protocols for tags and readers with and without a server
by: Han, Song, et al.
Published: (2013) -
Mutual authentication protocol for RFID tags based on synchronised secret information with monitor
by: Han, Song, et al.
Published: (2007) -
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008) -
A critical analysis of RFID security protocols
by: Sharif, A., et al.
Published: (2008) -
Applications for RFID in pharmaceutical industry
by: Potdar, M., et al.
Published: (2006)