URASP: an ultralightweight RFID authentication scheme using permutation operation
Due to low-cost, ease of use and convenience, Radio Frequency IDentification (RFID) is a contactless technology that has become more and more promising for automatic identification of an object and people without physical contact. However, the RFID system faces major issues related to its security a...
| Main Authors: | Mohd Shariq, Singh, Karan, Maurya, Pramod Kumar, Ahmadian, Ali, Kamel Ariffin, Muhammad Rezal |
|---|---|
| Format: | Article |
| Published: |
Springer
2021
|
| Online Access: | http://psasir.upm.edu.my/id/eprint/93495/ |
Similar Items
An immune system-inspired byte permutation function to improve confusion performance of round transformation in symmetric encryption scheme.
by: Ariffin, Suriyani, et al.
Published: (2012)
by: Ariffin, Suriyani, et al.
Published: (2012)
Verifying the authenticity of digital certificates
by: Kamel Ariffin, Muhammad Rezal
Published: (2021)
by: Kamel Ariffin, Muhammad Rezal
Published: (2021)
S-Permutability, Semipermutability, c-Normality And
c-Permutability Of Subgroups In Finite Groups
by: Al-Sharo, Doa'a Mustafa
Published: (2014)
by: Al-Sharo, Doa'a Mustafa
Published: (2014)
Permutation groups in automata diagrams
by: Gan, Yee Siang, et al.
Published: (2013)
by: Gan, Yee Siang, et al.
Published: (2013)
A survey of RFID authentication protocols
by: Yousuf, Y., et al.
Published: (2008)
by: Yousuf, Y., et al.
Published: (2008)
Sticker systems over permutation groups
by: Mohd Sebry, Nurul Afidah, et al.
Published: (2013)
by: Mohd Sebry, Nurul Afidah, et al.
Published: (2013)
USING RFID TECHNOLOGY TO LOCATE MISSING BOOKS IN THE LIBRARY: A FEASIBILITY STUDY
by: Samani, Karan Kishorkumar
Published: (2006)
by: Samani, Karan Kishorkumar
Published: (2006)
Bottleneck-based heuristic for permutation flowshop scheduling
by: Isa, Noor Amira
Published: (2017)
by: Isa, Noor Amira
Published: (2017)
Noise induced synchronization of time-delayed semiconductor lasers and authentication based asymmetric encryption.
by: Banerjee, Santo, et al.
Published: (2013)
by: Banerjee, Santo, et al.
Published: (2013)
JPEG Image Encryption Using Combined Reversed And Normal Direction-Distorted Dc Permutation With Key Scheduling Algorithm-Based Permutation
by: Abu, Ahmad Zaidee
Published: (2008)
by: Abu, Ahmad Zaidee
Published: (2008)
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016)
by: Nek Abdul Rahman, Normahirah, et al.
Published: (2016)
The development of deniable authentication protocol based on the bivariate function hard problem
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)
by: Nek Abd Rahman, Normahirah, et al.
Published: (2014)
Genuine multipartite nonlocality of permutationally invariant Gaussian states
by: Xu, Buqing, et al.
Published: (2017)
by: Xu, Buqing, et al.
Published: (2017)
Splicing systems over permutation groups of length two
by: Hamzah, Nur Zatul Akmar, et al.
Published: (2012)
by: Hamzah, Nur Zatul Akmar, et al.
Published: (2012)
The hidden permutation model and location-based activity recognition
by: Bui, H.H., et al.
Published: (2008)
by: Bui, H.H., et al.
Published: (2008)
New recursive circular algorithm for listing all permutations
by: Karim, Sharmila, et al.
Published: (2014)
by: Karim, Sharmila, et al.
Published: (2014)
A new efficient Rabin-like signature scheme
by: Mahad, Zahari, et al.
Published: (2016)
by: Mahad, Zahari, et al.
Published: (2016)
An identification scheme based on bivariate function hard problem
by: Tea, Boon Chian, et al.
Published: (2014)
by: Tea, Boon Chian, et al.
Published: (2014)
RFID mutual authentication protocols for tags and readers with and without a server
by: Han, Song, et al.
Published: (2013)
by: Han, Song, et al.
Published: (2013)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
Permutation entropy based full-reference image
quality qssessment
by: Baqar, Mohtashim *, et al.
Published: (2019)
by: Baqar, Mohtashim *, et al.
Published: (2019)
Improving the security of LBlock lightweight algorithm using bit permutation
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
by: AlDabbagh, Sufyan Salim Mahmood, et al.
Published: (2013)
Text and image: a new hybrid authentication scheme
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2021)
by: Mohd Ariffin, Noor Afiza, et al.
Published: (2021)
A new arbitrated signing scheme based on BFHP
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2015)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2015)
A new arbitrated signing scheme based on BFHP
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
by: Abd Ghafar, Amir Hamzah, et al.
Published: (2014)
Anonymous mutual authentication protocol for RFID tag without back-end database
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Mutual authentication protocol for RFID tags based on synchronised secret information with monitor
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Permutation flow shop scheduling: fuzzy particle swarm optimization approach
by: Ling, S., et al.
Published: (2011)
by: Ling, S., et al.
Published: (2011)
Improved Watermarking Algorithm Based on Discrete Wavelet Transform and Fibonacci Permutation
by: Salem Hussin, Saleh Hussin
Published: (2005)
by: Salem Hussin, Saleh Hussin
Published: (2005)
Modified Neh Heuristic On Makespan Reduction In Permutation Flow Shop Problems
by: Chong, Zheng Ziao
Published: (2015)
by: Chong, Zheng Ziao
Published: (2015)
Methodology to develop bottleneck-based heuristic for permutation flow shop scheduling
by: Isa, Noor Amira, et al.
Published: (2020)
by: Isa, Noor Amira, et al.
Published: (2020)
Identity-based encryption schemes - a review
by: Tea, Boon Chian, et al.
Published: (2019)
by: Tea, Boon Chian, et al.
Published: (2019)
A secure authentication scheme for bluetooth connection
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
by: Diallo, Alhassane Saliou, et al.
Published: (2014)
Some properties of semi-simple splicing system over some permutation groups
by: Selvarajoo, Mathuri, et al.
Published: (2013)
by: Selvarajoo, Mathuri, et al.
Published: (2013)
Synchronization and a secure communication scheme using optical star network
by: Theesar, S. Jeeva Sathya, et al.
Published: (2013)
by: Theesar, S. Jeeva Sathya, et al.
Published: (2013)
Novel forgery mechanisms in multivariate signature schemes
by: Abdul Jamal, Nurul Amiera Sakinah, et al.
Published: (2023)
by: Abdul Jamal, Nurul Amiera Sakinah, et al.
Published: (2023)
Comparative analysis of three asymmetric encryption schemes based upon the intractability of square roots modulo N = p²q
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
by: Asbullah, Muhammad Asyraf, et al.
Published: (2014)
A source authentication and data confidentiality scheme for multicast networks
by: Benmachiche, Abderrahim, et al.
Published: (2016)
by: Benmachiche, Abderrahim, et al.
Published: (2016)
A multi-factor authentication scheme using attack recognition and key generator technique
by: Mohd Ariffin, Noor Afiza
Published: (2017)
by: Mohd Ariffin, Noor Afiza
Published: (2017)
Mutual Authentication Protocol Model For Low-Cost RFID Systems Based On Shelled Random Value
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
by: al-Dala'ien, Mu'awya Naser Salam
Published: (2011)
Similar Items
-
An immune system-inspired byte permutation function to improve confusion performance of round transformation in symmetric encryption scheme.
by: Ariffin, Suriyani, et al.
Published: (2012) -
Verifying the authenticity of digital certificates
by: Kamel Ariffin, Muhammad Rezal
Published: (2021) -
S-Permutability, Semipermutability, c-Normality And
c-Permutability Of Subgroups In Finite Groups
by: Al-Sharo, Doa'a Mustafa
Published: (2014) -
Permutation groups in automata diagrams
by: Gan, Yee Siang, et al.
Published: (2013) -
A survey of RFID authentication protocols
by: Yousuf, Y., et al.
Published: (2008)