Academic literature on the topic 'RFID mutual authentication protocol'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'RFID mutual authentication protocol.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "RFID mutual authentication protocol"

1

He, Hong, Qi Li, and Zhi Hong Zhang. "RFID Security Authentication Protocol Based on Hash for the Lightweight RFID Systems." Applied Mechanics and Materials 380-384 (August 2013): 2831–36. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2831.

Full text
Abstract:
In order to solve the RFID authentication protocols, a new mutual authentication protocol based on Hash for the lightweight RFID system is proposed in this paper. Compared with several RFID authentication protocols with the similar structure, the proposed protocol can effectively solve the privacy and security of the RFID system, and it has significant performance advantages. It greatly reduces the amount storage and computation of tags.
APA, Harvard, Vancouver, ISO, and other styles
2

Xia, Hui. "Research on Multiple Security Authentication Protocol in RFID System." Applied Mechanics and Materials 457-458 (October 2013): 770–73. http://dx.doi.org/10.4028/www.scientific.net/amm.457-458.770.

Full text
Abstract:
Weak security of RFID system is concerned by more and more people because of the fast development of internet of things. Some existing RFID authentications protocols begin to be analyzed, such as Mutual three-pass authentication, randomized Hash-Lock, which has some problem of being difficult to resist a variety of network attacks such as forgery tag attacks and a new bidirectional security authentication protocol,A multiple security authentication protocol is proposed to overcome the disadvantage of being vulnerable to cyber attacks. Analysis shows that this approach is of good security and privacy, low cost, and high efficiency.
APA, Harvard, Vancouver, ISO, and other styles
3

Chia-Hui Wei, Min-Shiang Hwang, and A. Y. Chin. "A Mutual Authentication Protocol for RFID." IT Professional 13, no. 2 (March 2011): 20–24. http://dx.doi.org/10.1109/mitp.2011.17.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Mujahid, Umar, Atif Raza Jafri, and M. Najam-ul-Islam. "Efficient Hardware Implementation of Ultralightweight RFID Mutual Authentication Protocol." Journal of Circuits, Systems and Computers 25, no. 07 (April 22, 2016): 1650078. http://dx.doi.org/10.1142/s021812661650078x.

Full text
Abstract:
Security and privacy are the two major concerns of radio-frequency identification (RFID) based identification systems. Several researchers have proposed ultralightweight mutual authentication protocols (UMAPs) to ensure the security of the low cost RFID tags in recent years. However, almost all of the previously proposed protocols have some serious security flaws and are vulnerable to various security attacks (full disclosure attack, desynchronization attack, impersonation attack, etc.). Recently, a more sophisticated and robust UMAP: Robust confidentiality integrity and authentication (RCIA)1 [U. Mujahid, M. Najam-ul-Islam and M. Ali Shami, RCIA: A new ultralightweight RFID authentication protocol using recursive hash, Int. J. Distrib. Sens. Netw. 2015 (2015) 642180] has been proposed. A new ultralightweight primitive, “recursive hash” has been used extensively in the protocol design which provides hamming weight unpredictability and irreversibility to ensure optimal security. In addition to security and privacy, small chip area is another design constraint which is mandatory requirement for a protocol to be considered as ultralightweight authentication protocol. Keeping in view the scenario presented above, this paper presents the efficient hardware implementation of the RCIA for EPC-C1G2 tags. Both the FPGA and ASIC implementation flows have been adopted. The FPGA design flow is primarily used to validate the functionality of the proposed hardware design whereas ASIC design (using TSMC 0.35 μm library) is used to validate the gate count. To the best of our knowledge, this is the first FPGA and ASIC implementation of any ultralightweight RFID authentication protocol. The simulation and synthesis results of the proposed optimal hardware architecture show the compatibility of the RCIA with extremely low cost RFID tags.
APA, Harvard, Vancouver, ISO, and other styles
5

V. Sampangi, Raghav, and Srinivas Sampalli. "RFID Mutual Authentication Protocols based on Gene Mutation and Transfer." Journal of Communications Software and Systems 9, no. 1 (March 23, 2013): 44. http://dx.doi.org/10.24138/jcomss.v9i1.157.

Full text
Abstract:
Radio Frequency Identification (RFID) is a technology that is very popular due to the simplicity in its technology and high adaptability in a variety of areas. The simplicity in the technology, however, comes with a caveat – RFID tags have severe resource restrictions, which make them vulnerable to a range of security attacks. Such vulnerability often results in the loss of privacy of the tag owner and other attacks on tags. Previous research in RFID security has mainly focused on authenticating entities such as readers / servers, which communicate with the tag. Any security mechanism is only as strong as the encryption keys used. Since RFID communication is wireless, critical messages such as key exchange messages are vulnerable to attacks. Therefore, we present a mutual authentication protocol that relies on independent generation and dynamic updates of encryption keys thereby removing the need for key exchange, which is based on the concept of gene mutation and transfer. We also present an enhanced version of this protocol, which improves the security offered by the first protocol. The novelty of the proposed protocols is in the independent generation, dynamic and continuous updates of encryption keys and the use of the concept of gene mutation / transfer to offer mutual authentication of the communicating entities. The proposed protocols are validated by simulation studies and security analysis.
APA, Harvard, Vancouver, ISO, and other styles
6

Baashirah, Rania, and Abdelshakour Abuzneid. "SLEC: A Novel Serverless RFID Authentication Protocol Based on Elliptic Curve Cryptography." Electronics 8, no. 10 (October 15, 2019): 1166. http://dx.doi.org/10.3390/electronics8101166.

Full text
Abstract:
Internet of Things (IoT) is a new paradigm that has been evolving into the wireless sensor networks to expand the scope of networked devices (or things). This evolution drives communication engineers to design secure and reliable communication at a low cost for many network applications such as radio frequency identification (RFID). In the RFID system, servers, readers, and tags communicate wirelessly. Therefore, mutual authentication is necessary to ensure secure communication. Normally, a central server supports the authentication of readers and tags by distributing and managing the credentials. Recent lightweight RFID authentication protocols have been proposed to satisfy the security features of RFID networks. Using a serverless RFID system is an alternative solution to using a central server. In this model, both the reader and the tag perform mutual authentication without the need for the central server. However, many security challenges arise from implementing lightweight authentication protocols in serverless RFID systems. We propose a new secure serverless RFID authentication protocol based on the famous elliptic curve cryptography (ECC). The protocol also maintains the confidentiality and privacy of the messages, tag information, and location. Although most of the current serverless protocols assume secure channels in the setup phase, we assume an insecure environment during the setup phase between the servers, readers, and tags. We ensure that the credentials can be renewed by any checkpoint server in the mobile RFID network. Thus, we implement ECC in the setup phase (renewal phase), to transmit and store the communication credentials of the server to multiple readers so that the tags can perform the mutual authentication successfully while far from the server. The proposed protocol is compared with other serverless frameworks proposed in the literature in terms of computation cost and attacks resistance.
APA, Harvard, Vancouver, ISO, and other styles
7

Chen, Chien-Ming, Shuai-Min Chen, Xinying Zheng, Pei-Yu Chen, and Hung-Min Sun. "A Secure RFID Authentication Protocol Adopting Error Correction Code." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/704623.

Full text
Abstract:
RFID technology has become popular in many applications; however, most of the RFID products lack security related functionality due to the hardware limitation of the low-cost RFID tags. In this paper, we propose a lightweight mutual authentication protocol adopting error correction code for RFID. Besides, we also propose an advanced version of our protocol to provide key updating. Based on the secrecy of shared keys, the reader and the tag can establish a mutual authenticity relationship. Further analysis of the protocol showed that it also satisfies integrity, forward secrecy, anonymity, and untraceability. Compared with other lightweight protocols, the proposed protocol provides stronger resistance to tracing attacks, compromising attacks and replay attacks. We also compare our protocol with previous works in terms of performance.
APA, Harvard, Vancouver, ISO, and other styles
8

Qin, Hang, and Yi Liu. "A Secure Lightweight Mutual Authentication for RFID Systems." Applied Mechanics and Materials 644-650 (September 2014): 4496–500. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.4496.

Full text
Abstract:
Radio Frequency Identification (RFID) technology is an automated identification technology which is widely used to identify and track all kind of objects. It is well suitable for many fields and is expected to replace barcodes in the near future. However, it is a challenging task to design an authentication protocol because of the limited resource of low-cost RFID tags. Recently, a lightweight RFID authentication protocol presented by Kulseng et al uses Physically Unclonable Functions (PUFs) and Linear Feedback Shift Registers (LFSRs) which are well known lightweight operations. The number of gates which the protocol require can be significantly decreased. Unfortunately, their protocol faces several serious security issues. In this paper, based PUFs and LFSRs, we suggest a secure mutual authentication for low-cost RFID Systems. Security analysis shows that our protocol owns security and privacy.
APA, Harvard, Vancouver, ISO, and other styles
9

Piramuthu, Selwyn. "RFID mutual authentication protocols." Decision Support Systems 50, no. 2 (January 2011): 387–93. http://dx.doi.org/10.1016/j.dss.2010.09.005.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Ahn, Hae-Soon, Ki-Dong Bu, Eun-Jun Yoon, and In-Gil Nam. "RFID Mutual Authentication Protocol Providing Stronger Security." KIPS Transactions:PartC 16C, no. 3 (June 30, 2009): 325–34. http://dx.doi.org/10.3745/kipstc.2009.16-c.3.325.

Full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "RFID mutual authentication protocol"

1

Kulseng, Lars Skaar. "Lightweight mutual authentication, owner transfer, and secure search protocols for RFID systems." [Ames, Iowa : Iowa State University], 2009.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Chung, Harold. "Chaos Based RFID Authentication Protocol." Thèse, Université d'Ottawa / University of Ottawa, 2013. http://hdl.handle.net/10393/24250.

Full text
Abstract:
Chaotic systems have been studied for the past few decades because of its complex behaviour given simple governing ordinary differential equations. In the field of cryptology, several methods have been proposed for the use of chaos in cryptosystems. In this work, a method for harnessing the beneficial behaviour of chaos was proposed for use in RFID authentication and encryption. In order to make an accurate estimation of necessary hardware resources required, a complete hardware implementation was designed using a Xilinx Virtex 6 FPGA. The results showed that only 470 Xilinx Virtex slices were required, which is significantly less than other RFID authentication methods based on AES block cipher. The total number of clock cycles required per encryption of a 288-bit plaintext was 57 clock cycles. This efficiency level is many times higher than other AES methods for RFID application. Based on a carrier frequency of 13.56Mhz, which is the standard frequency of common encryption enabled passive RFID tags such as ISO-15693, a data throughput of 5.538Kb/s was achieved. As the strength of the proposed RFID authentication and encryption scheme is based on the problem of predicting chaotic systems, it was important to ensure that chaotic behaviour is maintained in this discretized version of Lorenz dynamical system. As a result, key boundaries and fourth order Runge Kutta approximation time step values that are unique for this new mean of chaos utilization were discovered. The result is a computationally efficient and cryptographically complex new RFID authentication scheme that can be readily adopted in current RFID standards such as ISO-14443 and ISO-15693. A proof of security by the analysis of time series data obtained from the hardware FPGA design is also presented. This is to ensure that my proposed method does not exhibit short periodic cycles, has an even probabilistic distribution and builds on the beneficial chaotic properties of the continuous version of Lorenz dynamical system.
APA, Harvard, Vancouver, ISO, and other styles
3

Jafri, Asad Abbas. "Enhanced secured authentication protocol for RFID systems." Thesis, Wichita State University, 2008. http://hdl.handle.net/10057/2029.

Full text
Abstract:
In this current era of change and revolutionary development every technology has passed on its successor and so has the barcodes. Barcodes have been there for decades and have been used in various products and these can be found in our daily life. The extensive use of barcodes is there in everyday life but the issues faced by them led to the invention of RFID-Radio Frequency Identification Tags. RFID were commercialized not before the early 1990s when the industrialists requested for its availability to the general public so that they can utilize so as to ease their tasks. One of the most important use of RFID came into play in supply chain and warehousing. These were the areas where the object was in a constant motion and there was also a dire need to quantize and track such objects. Like every technology introduced has its setbacks, so does the RFID Tags. The RFID Tags being a baby technology and still in a phase of reformation RFID is facing a major security issue, as it works in a open wireless environment and the current security features have been poor with respect to energy conservation, scalability, time and money. For a place where electronic flow of information is the order of the day, there always has been a sense of security so as to protect the information, while containing time to nano of seconds. This paper similarly focuses on securing RFID communication, and our paper suggests a method that would not only secure the information but would also conserve time and energy. Various methods have been proposed but all are complex and require processing at the Tag, whereas our method takes the calculation and the complexity and sets it at the RFID Access Point.
Thesis [M.S] - Wichita State University, College of Engineering, Dept. of Electrical and Computer Science Engineering
APA, Harvard, Vancouver, ISO, and other styles
4

Jafri, Asad Abbas Pendse Ravindra. "Enhanced secured authentication protocol for RFID systems." A link to full text of this thesis in SOAR, 2008. http://hdl.handle.net/10057/2029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Edelev, Sviatoslav [Verfasser], Dieter [Akademischer Betreuer] Hogrefe, and Xiaoming [Akademischer Betreuer] Fu. "Towards a Lightweight, Secure, and Untraceable RFID Authentication Protocol / Sviatoslav Edelev. Gutachter: Dieter Hogrefe ; Xiaoming Fu. Betreuer: Dieter Hogrefe." Göttingen : Niedersächsische Staats- und Universitätsbibliothek Göttingen, 2015. http://d-nb.info/1076673597/34.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Malecký, Marek. "Analýza vybraných bezpečnostních protokolů." Master's thesis, Vysoké učení technické v Brně. Fakulta informačních technologií, 2010. http://www.nusl.cz/ntk/nusl-237107.

Full text
Abstract:
The subject of this thesis is to study available security protocols and tools for their verification. The first part is devoted to briefly describe the concepts related to the area of security protocols and verification logics. The second part directly lists various protocols, along with attacks and errors found in design. Next chapter describes the most important tools for automatic analysis of security protocols in more detail. The main part deals with verification of security protocols selected in the chosen tool called Scyther. In conclusion, examples of multiprotocol attacks along with a summary table are displayed.
APA, Harvard, Vancouver, ISO, and other styles
7

SANTHANAM, LAKSHMI. "Integrated Security Architecture for Wireless Mesh Networks." University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1202846575.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Yuan, Ching-chien, and 袁境鍵. "Hardware Implementation of RFID Mutual Authentication Protocol." Thesis, 2009. http://ndltd.ncl.edu.tw/handle/46028509272753713099.

Full text
Abstract:
碩士
義守大學
電子工程學系碩士班
97
Radio Frequency Identification (RFID) is a wireless technology which utilizes radio communication to identify objects with a unique electrical identity. The widespread deployment of RFID technologies may generate new threats to security and user privacy. One of the main drawbacks for RFID technology is the weak authentication systems between reader and tag. In general, weak authentication systems that either leak the password directly over the network or that leak sufficient information while performing authentication to allow intruders to deduce or guess at the password. According to EPCglobal Class1 Gen2 authentication system, the important information in tag will be exposed inadvertently because of the wireless transmission of data while performing authentication and causes much of threat to security. In this dissertation, we study the RFID tag-reader mutual authentication scheme. To avoid direct exposure of vital information from wireless transmission, the primitive exposed information must be covered in authentication process. A hardware implementation of mutual authentication protocol for RFID system is also proposed. The proposed system was simulated using Altera Quartus II software. The system has been successfully implemented in hardware using Altera DE2 board includes an Altera Cyclone II Field Programmable Gate Array (FPGA). The output waveforms from the FPGA have been displayed on the 16702A Logic Analysis System for real time verification. Finally the gate level files have been performed within mutual authentication schemes using Synopsys Design Vision from CIC and analyzed the power dissipation with different authentication schemes by Prime Power.
APA, Harvard, Vancouver, ISO, and other styles
9

Li, Perry, and 李培宇. "RFID mutual Authentication Protocol based on Hamming Distance." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/56512911502492089377.

Full text
Abstract:
碩士
國立交通大學
網路工程研究所
99
RFID is a technology that uses the RF technology to transfer ID. The RFID applications include electronic wallet, access control card, … , etc. Because the passive RFID Tag has resourse constraint issues, the RFID systems usually have some security problems, such as tracing attack, denial of service, forward security, replay attack, impersonation attack and relay attack, etc. To address the security issues, lots of solutions had been proposed. The RFID standard supports CRC function, and the function can extend or shrink a variable length string to a fixed length string. So, we can use it to compare the different of variable length strings. And we can then use the result to detect the security attack in the RFID system. The circuit of hamming distance isn’t complex, and it has high performance. In this thesis, we proposed an authentication protocol, MAPHD, which uses the hamming distance to compare the key strings. With carefull discussion and comparison, we conclude that our protocol can provide good protection for the security of RFID applications with lightweight overhead of tag computation.
APA, Harvard, Vancouver, ISO, and other styles
10

Liao, Wei-Chih, and 廖偉志. "Secure and Efficient Mutual Authentication Protocol for RFID systems." Thesis, 2011. http://ndltd.ncl.edu.tw/handle/13935129028580827426.

Full text
Abstract:
碩士
國立交通大學
資訊科學與工程研究所
99
Radio Frequency Identification (RFID) is a non-contact sensor network technology to automate identification. RFID systems had been applied to many fields and have been considered as a key infrastructure for the ubiquitous society in the future. However, because RFID tag on the inherent limitations of hardware resources, RFID has various security threats like privacy problem, eavesdropping, tag cloning, tag tracing, etc. To address these problems, lots of solutions had been proposed. RFID authentication protocol is one kind of these solutions. The point of RFID authentication protocol is to enforce the security policy between legal RFID tags can the legal RFID readers. RFID authentication protocols provide a mutual authentication mechanism to protect RFID system. But most of them have some drawbacks. These problems include the security not strong enough to resist various RFID attacks, the computation overhead of RFID tag is too high, and the back-end server spends too much time for searching RFID tag data, and etc. In this thesis, we proposed two RFID authentication protocols to overcome these drawbacks. In our analysis, the results have demonstrated that our RFID authentication protocols can resist most common RFID attacks and are more effective than most RFID authentication protocols.
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "RFID mutual authentication protocol"

1

Kang, You Sung, Elizabeth O’Sullivan, Dooho Choi, and Maire O’Neill. "Security Analysis on RFID Mutual Authentication Protocol." In Information Security Applications, 65–74. Cham: Springer International Publishing, 2016. http://dx.doi.org/10.1007/978-3-319-31875-2_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Zhang, Changlun, and Haibing Mu. "A Lightweight Mutual Authentication Protocol for RFID." In Lecture Notes in Electrical Engineering, 933–40. Dordrecht: Springer Netherlands, 2013. http://dx.doi.org/10.1007/978-94-007-7262-5_106.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Fernando, Harinda, and Jemal Abawajy. "A Hybrid Mutual Authentication Protocol for RFID." In Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, 310–11. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-29154-8_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Kim, Hyunsung. "Enhanced Hash-Based RFID Mutual Authentication Protocol." In Communications in Computer and Information Science, 70–77. Berlin, Heidelberg: Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-35264-5_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jin, Yongming, Huiping Sun, Wei Xin, Song Luo, and Zhong Chen. "Lightweight RFID Mutual Authentication Protocol against Feasible Problems." In Information and Communications Security, 69–77. Berlin, Heidelberg: Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-25243-3_6.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Hristea, Cristian, and Ferucio Laurenţiu Ţiplea. "A PUF-Based Destructive Private Mutual Authentication RFID Protocol." In Innovative Security Solutions for Information Technology and Communications, 331–43. Cham: Springer International Publishing, 2019. http://dx.doi.org/10.1007/978-3-030-12942-2_25.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fu, Xiaotong, and Yandong Guo. "A Lightweight RFID Mutual Authentication Protocol with Ownership Transfer." In Communications in Computer and Information Science, 68–74. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-36252-1_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Liang, Wei, Songyou Xie, Xiong Li, Jing Long, Yong Xie, and Kuan-Ching Li. "A Novel Lightweight PUF-Based RFID Mutual Authentication Protocol." In Lecture Notes in Electrical Engineering, 345–55. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-10-7398-4_36.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Lu, Yong, Anxi Wang, and Shuai Liu. "A Mutual Authentication Lightweight RFID Protocol for IoT Devices." In Communications in Computer and Information Science, 518–25. Singapore: Springer Singapore, 2020. http://dx.doi.org/10.1007/978-981-15-6113-9_58.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Saxena, Mansi, Rabindra Nath Shaw, and Jitendra Kumar Verma. "A Novel Hash-Based Mutual RFID Tag Authentication Protocol." In Data and Communication Networks, 1–12. Singapore: Springer Singapore, 2018. http://dx.doi.org/10.1007/978-981-13-2254-9_1.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "RFID mutual authentication protocol"

1

Huey, Khor Jing, Widad Ismail, and Mohammad Ghulam Rahman. "Fingerprint-based mutual authentication RFID protocol." In 2011 IEEE International Conference on Signal Processing, Communications and Computing (ICSPCC). IEEE, 2011. http://dx.doi.org/10.1109/icspcc.2011.6061560.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Huang, Yu-Jung, Chi-Huan Jiang, Hsuan-Hsun Wu, Yi-Hao Hong, and Kai-Jen Liu. "Mutual Authentication Protocol for RFID System." In 2011 IEEE 14th International Conference on Computational Science and Engineering (CSE). IEEE, 2011. http://dx.doi.org/10.1109/cse.2011.27.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Renault, Eric, and Selma Boumerdassit. "Simple mutual authentication protocol for RFID." In TENCON 2007 - 2007 IEEE Region 10 Conference. IEEE, 2007. http://dx.doi.org/10.1109/tencon.2007.4429088.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Lin, Chia-Min, Shyh-Chang Tsaur, Yeong-Chin Chen, and Iuon-Chang Lin. "HB Family RFID Mutual Authentication Protocol." In 2011 Seventh International Conference on Intelligent Information Hiding and Multimedia Signal Processing (IIH-MSP). IEEE, 2011. http://dx.doi.org/10.1109/iihmsp.2011.86.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Rahnama, Abbas, Mohammad Beheshti-Atashgah, Taraneh Eghlidos, and Mohammad Reza Aref. "An Ultra-Lightweight RFID Mutual Authentication Protocol." In 2019 16th International ISC (Iranian Society of Cryptology) Conference on Information Security and Cryptology (ISCISC). IEEE, 2019. http://dx.doi.org/10.1109/iscisc48546.2019.8985164.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Fernando, Harinda, and Jemal Abawajy. "Mutual Authentication Protocol for Networked RFID Systems." In 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). IEEE, 2011. http://dx.doi.org/10.1109/trustcom.2011.54.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Fan, Kai, Qi Luo, Hui Li, and Yintang Yang. "Cloud-Based Lightweight RFID Mutual Authentication Protocol." In 2017 IEEE Second International Conference on Data Science in Cyberspace (DSC). IEEE, 2017. http://dx.doi.org/10.1109/dsc.2017.41.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Kavitha, S. M., T. Suresh, and M. Joy Metilda Rani. "RFID implementation with secure mutual authentication protocol." In 2012 International Conference on Computing, Electronics and Electrical Technologies (ICCEET). IEEE, 2012. http://dx.doi.org/10.1109/icceet.2012.6203738.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Luo, Liyun, and Daowei Liu. "An Improved Lightweight RFID Mutual-authentication Protocol." In Second International Conference on Mechanics, Materials and Structural Engineering (ICMMSE 2017). Paris, France: Atlantis Press, 2017. http://dx.doi.org/10.2991/icmmse-17.2017.45.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Huo, Weiguang, Qingkuan Dong, and Yuan Chen. "ECC-based RFID/NFC Mutual Authentication Protocol." In 2015 2nd International Workshop on Materials Engineering and Computer Sciences. Paris, France: Atlantis Press, 2015. http://dx.doi.org/10.2991/iwmecs-15.2015.31.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "RFID mutual authentication protocol"

1

Oiwa, Y., H. Watanabe, H. Takagi, K. Maeda, T. Hayashi, and Y. Ioku. Mutual Authentication Protocol for HTTP. RFC Editor, April 2017. http://dx.doi.org/10.17487/rfc8120.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Hartman, S., M. Wasserman, and D. Zhang. Extensible Authentication Protocol (EAP) Mutual Cryptographic Binding. RFC Editor, October 2013. http://dx.doi.org/10.17487/rfc7029.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Badra, M., A. Luchuk, and J. Schoenwaelder. Using the NETCONF Protocol over Transport Layer Security (TLS) with Mutual X.509 Authentication. RFC Editor, June 2015. http://dx.doi.org/10.17487/rfc7589.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Oiwa, Y., H. Watanabe, H. Takagi, K. Maeda, T. Hayashi, and Y. Ioku. Mutual Authentication Protocol for HTTP: Cryptographic Algorithms Based on the Key Agreement Mechanism 3 (KAM3). RFC Editor, April 2017. http://dx.doi.org/10.17487/rfc8121.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!

To the bibliography