Cited By
View all- Baashirah RAbuzneid A(2018)Survey on Prominent RFID Authentication Protocols for Passive TagsSensors10.3390/s1810358418:10(3584)Online publication date: 22-Oct-2018
In recent years, RFID (radio-frequency identification) systems are widely used in many applications. One of the most important applications for this technology is the Internet of things (IoT). Therefore, researchers have proposed several authentication ...
Due to the storage capacity and computational power restrictions of low-cost RFID tags based on the EPC-C1G2 standard, most of the existing authentication protocols seem too complicated to be appropriate for these tags; thus the design of authentication ...
We show a number of latest privacy-preserving two-factor schemes are problematic.De-synchronization attack is a serious threat to anonymous schemes and deserves attention.We present a new scheme to overcome the identified flaws with nearly no additional ...
Association for Computing Machinery
New York, NY, United States
Check if you have access through your login credentials or your institution to get full access on this article.
Sign in