Mutual Authentication Protocol Model For Low-Cost RFID Systems Based On Shelled Random Value
Designing a reliable secure low-cost protocol for radio-frequency identification (RFID) is difficult, standard cryptographic primitives can become a limitation for low-cost tags due to their costly large requirements in terms of circuit size, power consumption, and memory size. Therefore, ultraligh...
| Main Author: | al-Dala'ien, Mu'awya Naser Salam |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/42102/ http://eprints.usm.my/42102/1/MU%27AWYA_NASER_SALAM.pdf |
Similar Items
RFID mutual authentication protocols for tags and readers with and without a server
by: Han, Song, et al.
Published: (2013)
by: Han, Song, et al.
Published: (2013)
Anonymous mutual authentication protocol for RFID tag without back-end database
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Mutual authentication protocol for RFID tags based on synchronised secret information with monitor
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
A survey of RFID authentication protocols
by: Yousuf, Y., et al.
Published: (2008)
by: Yousuf, Y., et al.
Published: (2008)
A RFID Protocol For Detecting The Existence Of A Single RFID Tag By Two RFID Readers
by: Tan , Aik Theng
Published: (2012)
by: Tan , Aik Theng
Published: (2012)
Privacy-preserving transactions protocol using mobile agents with mutual authentication
by: Han, Song, et al.
Published: (2007)
by: Han, Song, et al.
Published: (2007)
Improved TLS protocol for platform integrity assurance using mutual attestation
by: Abd Aziz, Norazah
Published: (2014)
by: Abd Aziz, Norazah
Published: (2014)
Dynamic reciprocal authentication protocol for mobile cloud computing
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
by: Ahmed, Abdulghani Ali, et al.
Published: (2021)
A survey of RFID authentication protocols based on hash-chain method
by: Syamsuddin, I, et al.
Published: (2008)
by: Syamsuddin, I, et al.
Published: (2008)
Fast And Simple NEMO Authentication Via Random Number.
by: Tan, Tat Kin, et al.
Published: (2007)
by: Tan, Tat Kin, et al.
Published: (2007)
Mutual attestation and integrity verification of RFID system using trusted platform module (TPM) / Mohd Faizal Mubarak
by: Mubarak, Mohd Faizal
Published: (2010)
by: Mubarak, Mohd Faizal
Published: (2010)
Analyzing verbal and pictorial Arab’s facebook posts during
the Israeli attack on Gaza Strip in 2021
by: Al-Dala’ien, Othman Aref, et al.
Published: (2023)
by: Al-Dala’ien, Othman Aref, et al.
Published: (2023)
A Novel Protocol For Enhancing The Security Of Electronic Transaction Using Gsm Authentication
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2006)
by: Abu Bakar, Kamalrulnizam, et al.
Published: (2006)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
On the Rila-Mitchell security protocols for biometrics-based cardholder authentication in smartcards
by: Phan, , RCW, et al.
Published: (2005)
by: Phan, , RCW, et al.
Published: (2005)
Biohashing: two factor authentication featuring fingerprint data and tokenised random number
by: Jin, , ATB, et al.
Published: (2004)
by: Jin, , ATB, et al.
Published: (2004)
An integrated dual factor authenticator based on the face data and tokenised random number
by: Teoh, , ABJ, et al.
Published: (2004)
by: Teoh, , ABJ, et al.
Published: (2004)
Personal authenticator on the basis of two-factors: Palmprint features and tokenized random data
by: Pang, Ying Han, et al.
Published: (2004)
by: Pang, Ying Han, et al.
Published: (2004)
Bio-discretization: Biometrics authentication featuring face data and tokenised random number
by: Foon, , NH, et al.
Published: (2004)
by: Foon, , NH, et al.
Published: (2004)
The RFID invasion – The solutions?
by: Oxley, A.
Published: (2005)
by: Oxley, A.
Published: (2005)
An enhancement of authentication and energy efficient clustering protocol for wireless sensor network / Ahmed Abdulhadi Jasim
by: Ahmed Abdulhadi , Jasim
Published: (2021)
by: Ahmed Abdulhadi , Jasim
Published: (2021)
Improving The Efficiency Of Sip
Authentication Based On The
Pre-Calculated Look-Up Table
by: Jaber, Aws Naser
Published: (2013)
by: Jaber, Aws Naser
Published: (2013)
Unreliable Network Re-Authentication Protocol Based On Hybrid Key Using CSP Approach.
by: Ramadass, Sureswaran, et al.
Published: (2007)
by: Ramadass, Sureswaran, et al.
Published: (2007)
Effects of Authentication of Users in Mobile Internet Protocol Version 6
by: Obenofunde, Simon Tabi
Published: (2004)
by: Obenofunde, Simon Tabi
Published: (2004)
Two-factor face authentication: Topographic Independent Component Analysis (TICA) and Multispace Random Projection (MRP)
by: Lee, Gin Chong, et al.
Published: (2009)
by: Lee, Gin Chong, et al.
Published: (2009)
Ethical issues pertaining to 'Student RFID Tag' / Norhamiza Yarani
by: Yarani, Norhamiza
Published: (2006)
by: Yarani, Norhamiza
Published: (2006)
Attendence monitoring system via RFID / Zainirah Abdul Manan
by: Abdul Manan, Zainirah
Published: (2007)
by: Abdul Manan, Zainirah
Published: (2007)
Automated barrier gate system by using RFID (ABGS)
by: Suriya Morthi, Manivelu
Published: (2019)
by: Suriya Morthi, Manivelu
Published: (2019)
Performance Comparison of Transmission Control Protocol and User Datagram Protocol over Wireless Networks
by: Mohammed Hasan, Ali, et al.
Published: (2015)
by: Mohammed Hasan, Ali, et al.
Published: (2015)
Enhanced tight finite key scheme for quantum key distribution protocol to authenticate multi-party systems in cloud infrastructure
by: Khalid, Roszelinda
Published: (2018)
by: Khalid, Roszelinda
Published: (2018)
Item recognition tools for blind people using RFID
by: Ahamat @ Ahmad, Nazman
Published: (2007)
by: Ahamat @ Ahmad, Nazman
Published: (2007)
Crafting experiential value via smartphone apps channel
by: Rezaei, Sajad, et al.
Published: (2017)
by: Rezaei, Sajad, et al.
Published: (2017)
Secure login authentication system
by: Chow, Wen Chai
Published: (2018)
by: Chow, Wen Chai
Published: (2018)
The advent of industry fit RFID readers
by: Uddin, Md. Jasim, et al.
Published: (2009)
by: Uddin, Md. Jasim, et al.
Published: (2009)
URASP: an ultralightweight RFID authentication scheme using permutation operation
by: Mohd Shariq, et al.
Published: (2021)
by: Mohd Shariq, et al.
Published: (2021)
RFID-based vehicle speed monitoring and enforcement system
by: Tan, Kai Xian
Published: (2018)
by: Tan, Kai Xian
Published: (2018)
The battle between HF and UHF RFID
by: F., Mohd-Yasin, et al.
Published: (2008)
by: F., Mohd-Yasin, et al.
Published: (2008)
Mutual fund theorem for continuous time markets with random coefficients
by: Dokuchaev, Nikolai
Published: (2013)
by: Dokuchaev, Nikolai
Published: (2013)
Digital watermarking for medical image authentication
by: Noor Aqilah, Abdul Halim
Published: (2019)
by: Noor Aqilah, Abdul Halim
Published: (2019)
A critical analysis of RFID security protocols
by: Sharif, A., et al.
Published: (2008)
by: Sharif, A., et al.
Published: (2008)
Similar Items
-
RFID mutual authentication protocols for tags and readers with and without a server
by: Han, Song, et al.
Published: (2013) -
Anonymous mutual authentication protocol for RFID tag without back-end database
by: Han, Song, et al.
Published: (2007) -
Mutual authentication protocol for RFID tags based on synchronised secret information with monitor
by: Han, Song, et al.
Published: (2007) -
A survey of RFID authentication protocols
by: Yousuf, Y., et al.
Published: (2008) -
A RFID Protocol For Detecting The Existence Of A Single RFID Tag By Two RFID Readers
by: Tan , Aik Theng
Published: (2012)