RFID mutual authentication protocols for tags and readers with and without a server
RFID has very huge potential in today's social and business developments. RFID-based identification is an example of emerging technology which requires authentication Security and Privacy are one of the important issues in the design of practical RFID protocols. In this paper, we focus on RFID...
| Main Authors: | Han, Song, Dillon, Tharam S., Potdar, Vidyasagar, Chang, Elizabeth |
|---|---|
| Format: | Journal Article |
| Published: |
C R L Publishing Ltd.
2013
|
| Online Access: | http://hdl.handle.net/20.500.11937/64419 |
Similar Items
Anonymous mutual authentication protocol for RFID tag without back-end database
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Mutual authentication protocol for RFID tags based on synchronised secret information with monitor
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
A survey of RFID authentication protocols
by: Yousuf, Y., et al.
Published: (2008)
by: Yousuf, Y., et al.
Published: (2008)
Tamper detection in RFID tags, using, fragile watermarking
by: Potdar, Vidyasagar, et al.
Published: (2006)
by: Potdar, Vidyasagar, et al.
Published: (2006)
A RFID Protocol For Detecting The Existence Of A Single RFID Tag By Two RFID Readers
by: Tan , Aik Theng
Published: (2012)
by: Tan , Aik Theng
Published: (2012)
A critical analysis of RFID security protocols
by: Sharif, A., et al.
Published: (2008)
by: Sharif, A., et al.
Published: (2008)
Mutual Authentication Protocol Model For Low-Cost RFID Systems Based On Shelled Random Value
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
Applications for RFID in pharmaceutical industry
by: Potdar, M., et al.
Published: (2006)
by: Potdar, M., et al.
Published: (2006)
A framework of authentication and authorization for e-health services
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Bridge scour monitoring by coupling factor between reader and Tag antennas of RFID system
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2015)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2015)
Automated Data Capture Technologies: RFID
by: Potdar, Vidyasagar, et al.
Published: (2007)
by: Potdar, Vidyasagar, et al.
Published: (2007)
Tamper detection for ubiquitous RFID-enabled supply chain
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
New framework for authentication and authorization for e-health service systems
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Secure e-transactions protocol preserving privacy for customers and bidders
by: Han, Song, et al.
Published: (2005)
by: Han, Song, et al.
Published: (2005)
Recovering and restoring tampered RFID data using steganographic principles
by: Mohan, M., et al.
Published: (2006)
by: Mohan, M., et al.
Published: (2006)
RFID reader architectures and applications
by: Reaz, Mamun Bin Ibne, et al.
Published: (2009)
by: Reaz, Mamun Bin Ibne, et al.
Published: (2009)
Secure e-transactions protocol using intelligent mobile agents with fair privacy
by: Han, Song, et al.
Published: (2006)
by: Han, Song, et al.
Published: (2006)
Improving RFID read rate reliability by a systemic error detection approach
by: Potdar, Vidyasagar, et al.
Published: (2007)
by: Potdar, Vidyasagar, et al.
Published: (2007)
Secure web services using two-way authentication and three-party key establishment for service delivery
by: Han, Song, et al.
Published: (2009)
by: Han, Song, et al.
Published: (2009)
RFID technology and its industrial applications
by: Potdar, Vidyasagar, et al.
Published: (2016)
by: Potdar, Vidyasagar, et al.
Published: (2016)
The advent of industry fit RFID readers
by: Uddin, Md. Jasim, et al.
Published: (2009)
by: Uddin, Md. Jasim, et al.
Published: (2009)
Miniaturization of UHF RFID tag antenna
by: Daud, Nor Hidayah
Published: (2015)
by: Daud, Nor Hidayah
Published: (2015)
A mutual-healing key distribution scheme in wireless sensor networks
by: Tian, Biming, et al.
Published: (2011)
by: Tian, Biming, et al.
Published: (2011)
A self-healing and mutual-healing key distribution scheme using bilinear pairings for wireless networks
by: Tian, Biming, et al.
Published: (2008)
by: Tian, Biming, et al.
Published: (2008)
An authenticated self-healing key distribution scheme based on bilinear pairings
by: Tian, Biming, et al.
Published: (2009)
by: Tian, Biming, et al.
Published: (2009)
A novel printed antenna for ultrawideband RFID (UWB-RFID) tag
by: Abdel-Raouf, Hany Essam Eldin, et al.
Published: (2010)
by: Abdel-Raouf, Hany Essam Eldin, et al.
Published: (2010)
Linear microstrip resonator for UWB RFID tag
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2017)
by: Ibrahimy, Muhammad Ibn, et al.
Published: (2017)
Clone tag detection in distributed RFID systems
by: Kamaludin, Hazalila, et al.
Published: (2018)
by: Kamaludin, Hazalila, et al.
Published: (2018)
New RFID tags to replace faulty ones
by: New Straits Times
Published: (2022)
by: New Straits Times
Published: (2022)
Fingerprinted secret sharing steganography for robustness against image cropping attacks
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
A survey of digital image watermarking techniques
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Dictionary module and UDC: Two new approaches to enhance embedding capacity of a steganographic channel
by: Potdar, Vidyasagar, et al.
Published: (2005)
by: Potdar, Vidyasagar, et al.
Published: (2005)
Design And Analysis Of Hexagonal Antenna For Uhf Rfid Reader
by: Nasrun Afiq, Adnan
Published: (2022)
by: Nasrun Afiq, Adnan
Published: (2022)
Design and analysis of hexagonal antenna for UHF RFID reader
by: Nasrun Afiq, Adnan, et al.
Published: (2025)
by: Nasrun Afiq, Adnan, et al.
Published: (2025)
Circular Microstrip patch antenna for UHF RFID reader
by: Mohd Hisyam, Mohd Ariff, et al.
Published: (2018)
by: Mohd Hisyam, Mohd Ariff, et al.
Published: (2018)
Web of things as a framework for ubiquitous intelligence and computing
by: Dillon, Tharam S., et al.
Published: (2009)
by: Dillon, Tharam S., et al.
Published: (2009)
Microstrip spiral resonator for the UWB chipless RFID tag
by: Hossain, A. K. M. Zakir, et al.
Published: (2014)
by: Hossain, A. K. M. Zakir, et al.
Published: (2014)
Microstrip spiral resonator for the UWB chipless RFID tag
by: Hossain, A. K. M. Z., et al.
Published: (2015)
by: Hossain, A. K. M. Z., et al.
Published: (2015)
Similar Items
-
Anonymous mutual authentication protocol for RFID tag without back-end database
by: Han, Song, et al.
Published: (2007) -
Mutual authentication protocol for RFID tags based on synchronised secret information with monitor
by: Han, Song, et al.
Published: (2007) -
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007) -
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008) -
A survey of RFID authentication protocols
by: Yousuf, Y., et al.
Published: (2008)