Journal articles on the topic 'RFID mutual authentication protocol'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'RFID mutual authentication protocol.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
He, Hong, Qi Li, and Zhi Hong Zhang. "RFID Security Authentication Protocol Based on Hash for the Lightweight RFID Systems." Applied Mechanics and Materials 380-384 (August 2013): 2831–36. http://dx.doi.org/10.4028/www.scientific.net/amm.380-384.2831.
Full textXia, Hui. "Research on Multiple Security Authentication Protocol in RFID System." Applied Mechanics and Materials 457-458 (October 2013): 770–73. http://dx.doi.org/10.4028/www.scientific.net/amm.457-458.770.
Full textChia-Hui Wei, Min-Shiang Hwang, and A. Y. Chin. "A Mutual Authentication Protocol for RFID." IT Professional 13, no. 2 (March 2011): 20–24. http://dx.doi.org/10.1109/mitp.2011.17.
Full textMujahid, Umar, Atif Raza Jafri, and M. Najam-ul-Islam. "Efficient Hardware Implementation of Ultralightweight RFID Mutual Authentication Protocol." Journal of Circuits, Systems and Computers 25, no. 07 (April 22, 2016): 1650078. http://dx.doi.org/10.1142/s021812661650078x.
Full textV. Sampangi, Raghav, and Srinivas Sampalli. "RFID Mutual Authentication Protocols based on Gene Mutation and Transfer." Journal of Communications Software and Systems 9, no. 1 (March 23, 2013): 44. http://dx.doi.org/10.24138/jcomss.v9i1.157.
Full textBaashirah, Rania, and Abdelshakour Abuzneid. "SLEC: A Novel Serverless RFID Authentication Protocol Based on Elliptic Curve Cryptography." Electronics 8, no. 10 (October 15, 2019): 1166. http://dx.doi.org/10.3390/electronics8101166.
Full textChen, Chien-Ming, Shuai-Min Chen, Xinying Zheng, Pei-Yu Chen, and Hung-Min Sun. "A Secure RFID Authentication Protocol Adopting Error Correction Code." Scientific World Journal 2014 (2014): 1–12. http://dx.doi.org/10.1155/2014/704623.
Full textQin, Hang, and Yi Liu. "A Secure Lightweight Mutual Authentication for RFID Systems." Applied Mechanics and Materials 644-650 (September 2014): 4496–500. http://dx.doi.org/10.4028/www.scientific.net/amm.644-650.4496.
Full textPiramuthu, Selwyn. "RFID mutual authentication protocols." Decision Support Systems 50, no. 2 (January 2011): 387–93. http://dx.doi.org/10.1016/j.dss.2010.09.005.
Full textAhn, Hae-Soon, Ki-Dong Bu, Eun-Jun Yoon, and In-Gil Nam. "RFID Mutual Authentication Protocol Providing Stronger Security." KIPS Transactions:PartC 16C, no. 3 (June 30, 2009): 325–34. http://dx.doi.org/10.3745/kipstc.2009.16-c.3.325.
Full textWANG, Li-bin, Chang-she MA, and Tao WANG. "Secure and efficient RFID mutual authentication protocol." Journal of Computer Applications 28, no. 9 (June 5, 2009): 2236–38. http://dx.doi.org/10.3724/sp.j.1087.2008.02236.
Full textHuang, Yu-Jung, Wei-Cheng Lin, and Hung-Lin Li. "Efficient Implementation of RFID Mutual Authentication Protocol." IEEE Transactions on Industrial Electronics 59, no. 12 (December 2012): 4784–91. http://dx.doi.org/10.1109/tie.2011.2178215.
Full textYu-Jung Huang, Ching-Chien Yuan, Ming-Kun Chen, Wei-Cheng Lin, and Hsien-Chiao Teng. "Hardware Implementation of RFID Mutual Authentication Protocol." IEEE Transactions on Industrial Electronics 57, no. 5 (May 2010): 1573–82. http://dx.doi.org/10.1109/tie.2009.2037098.
Full textJia, Qing Xuan, Xin Wang, Xin Gao, Pan Pan Gao, and Bing Zhao. "An Effective Ultralightweight RFID Secure Protocol with Mutual Authentication." Applied Mechanics and Materials 278-280 (January 2013): 1966–71. http://dx.doi.org/10.4028/www.scientific.net/amm.278-280.1966.
Full textZhang, Nan, Jian Hua Zhang, and Jun Yang. "RFID Mutual Authentication Protocol Based on Chaos Key." Advanced Materials Research 846-847 (November 2013): 1519–23. http://dx.doi.org/10.4028/www.scientific.net/amr.846-847.1519.
Full textZhang, Bing, Zhi Guang Qin, Guo Gen Wan, and Xin Xin Ma. "Design and Analysis of a Low-Cost Mutual Authentication Protocol for RFID." Applied Mechanics and Materials 543-547 (March 2014): 2255–61. http://dx.doi.org/10.4028/www.scientific.net/amm.543-547.2255.
Full textIbrahim, Alaauldin, and Gökhan Dalkılıç. "An Advanced Encryption Standard Powered Mutual Authentication Protocol Based on Elliptic Curve Cryptography for RFID, Proven on WISP." Journal of Sensors 2017 (2017): 1–10. http://dx.doi.org/10.1155/2017/2367312.
Full textKumar, Adarsh, Krishna Gopal, and Alok Aggarwal. "Cost and Lightweight Modeling Analysis of RFID Authentication Protocols in Resource Constraint Internet of Things." Journal of Communications Software and Systems 10, no. 3 (March 16, 2017): 179. http://dx.doi.org/10.24138/jcomss.v10i3.122.
Full textMikami, Shugo, Dai Watanabe, Yang Li, and Kazuo Sakiyama. "Fully Integrated Passive UHF RFID Tag for Hash-Based Mutual Authentication Protocol." Scientific World Journal 2015 (2015): 1–11. http://dx.doi.org/10.1155/2015/498610.
Full textRaju, Mehedi Hasan, Mosabber Uddin Ahmed, and Md Atiqur Rahman Ahad. "MUMAP: Modified Ultralightweight Mutual Authentication protocol for RFID enabled IoT networks." Journal of the Institute of Industrial Applications Engineers 9, no. 2 (April 25, 2021): 33–39. http://dx.doi.org/10.12792/jiiae.9.33.
Full textZhu, Feng, Peng Li, He Xu, and Ruchuan Wang. "A Lightweight RFID Mutual Authentication Protocol with PUF." Sensors 19, no. 13 (July 4, 2019): 2957. http://dx.doi.org/10.3390/s19132957.
Full textZHANG, Xue-jun, Wen-qi CAI, and Yu WANG. "Enhanced minimalist mutual-authentication protocol for RFID system." Journal of Computer Applications 32, no. 9 (May 13, 2013): 2395–99. http://dx.doi.org/10.3724/sp.j.1087.2012.02395.
Full textShemaili, Mouza Ahmad Bani, Chan Yeob Yeun, and Mohamed Jamal Zemerly. "Lightweight mutual authentication protocol for securing RFID applications." International Journal of Internet Technology and Secured Transactions 2, no. 3/4 (2010): 205. http://dx.doi.org/10.1504/ijitst.2010.037402.
Full textOh, Sejin, and Taejin Yun. "An RFID Mutual Authentication Protocol Using Tag’s ID." Journal of Security Engineering 14, no. 4 (August 31, 2017): 281–92. http://dx.doi.org/10.14257/jse.2017.08.05.
Full textHussein, Issam, Ramzy Ali, and Basil Jasim. "Design and Implementation of RFID Active Tags and Mutual Authentication Protocol with Ownership Transfer Stage." Iraqi Journal for Electrical and Electronic Engineering 13, no. 1 (June 1, 2017): 83–103. http://dx.doi.org/10.37917/ijeee.13.1.11.
Full textShi, Zhi Cai, Jin Zu Zhou, Yong Xiang Xia, and Chao Gang Yu. "A Novel RFID Authentication Protocol Based on NTRU." Applied Mechanics and Materials 411-414 (September 2013): 16–20. http://dx.doi.org/10.4028/www.scientific.net/amm.411-414.16.
Full textXiao, Liang, He Xu, Feng Zhu, Ruchuan Wang, and Peng Li. "SKINNY-Based RFID Lightweight Authentication Protocol." Sensors 20, no. 5 (March 2, 2020): 1366. http://dx.doi.org/10.3390/s20051366.
Full textDong, Qingkuan, Jiaqing Tong, and Yuan Chen. "Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud." International Journal of Distributed Sensor Networks 2015 (2015): 1–9. http://dx.doi.org/10.1155/2015/937198.
Full textFang, Ming Wei, Jun Jun Wu, Xin Fang Zhang, and Hong Chen. "A Novel ECC-Based RFID Authentication Protocol." Key Engineering Materials 474-476 (April 2011): 1764–69. http://dx.doi.org/10.4028/www.scientific.net/kem.474-476.1764.
Full textLee, Young-Seok, and Hoon Choi. "Tag-Reader Mutual Authentication Protocol for secure RFID environments." Journal of the Korea Institute of Information and Communication Engineering 19, no. 2 (February 28, 2015): 357–64. http://dx.doi.org/10.6109/jkiice.2015.19.2.357.
Full textOmer, Ashrar A., Johnson P. Thomas, and Ling Zhu. "Mutual authentication protocols for RFID systems." International Journal of Automation and Computing 5, no. 4 (October 2008): 348–65. http://dx.doi.org/10.1007/s11633-008-0348-9.
Full textGamal Ahmed, Eslam, Eman Shaaban, and Mohamed Hashem. "Lightweight Mutual Authentication Protocol for Low Cost RFID Tags." International journal of Network Security & Its Applications 2, no. 2 (April 25, 2010): 27–37. http://dx.doi.org/10.5121/ijnsa.2010.2203.
Full textMaurya, Pramod Kumar, and Satya Bagchi. "Cyclic group based mutual authentication protocol for RFID system." Wireless Networks 26, no. 2 (October 9, 2018): 1005–15. http://dx.doi.org/10.1007/s11276-018-1850-9.
Full textDehkordi, Masoud Hadian, and Yousof Farzaneh. "Improvement of the Hash-Based RFID Mutual Authentication Protocol." Wireless Personal Communications 75, no. 1 (August 25, 2013): 219–32. http://dx.doi.org/10.1007/s11277-013-1358-7.
Full textAyebie, Edoukou Berenger, and El Mamoun Souidi. "Rank-metric code-based mutual authentication protocol for RFID." Journal of Information Security and Applications 55 (December 2020): 102598. http://dx.doi.org/10.1016/j.jisa.2020.102598.
Full textFu, Qi, Jun Tan, and Hong Li. "Design and Analysis of a New Mutual Authentication Protocol for RFID." Advanced Materials Research 1006-1007 (August 2014): 548–51. http://dx.doi.org/10.4028/www.scientific.net/amr.1006-1007.548.
Full textMujahid, Umar, M. Najam-ul-Islam, and Madiha Khalid. "Efficient Hardware Implementation of KMAP+: An Ultralightweight Mutual Authentication Protocol." Journal of Circuits, Systems and Computers 27, no. 02 (September 11, 2017): 1850033. http://dx.doi.org/10.1142/s0218126618500330.
Full textZhang, Xiao Hong, Hui Qin Wang, and He Bo. "RFID Authentication and Communication Protocol Based on the Dynamic Active Tag ID and Key." Applied Mechanics and Materials 336-338 (July 2013): 1913–19. http://dx.doi.org/10.4028/www.scientific.net/amm.336-338.1913.
Full textLi, Shu, Xi Yang, and Ping Yuan Liang. "A New Hash-Based Authentication Protocol for RFID Using Varying Identifiers." Applied Mechanics and Materials 303-306 (February 2013): 2112–16. http://dx.doi.org/10.4028/www.scientific.net/amm.303-306.2112.
Full textShin, Ju-Seok, Se-Jin Oh, Cheol-Ho Jeong, Kyung-Ho Chung, and Kwang-Seon Ahn. "Improved An RFID Mutual Authentication Protocol Based on Hash Function." Journal of Korean Institute of Communications and Information Sciences 37, no. 3C (March 30, 2012): 241–50. http://dx.doi.org/10.7840/kics.2012.37c.3.241.
Full textOh, Se-Jin, Kyung-Ho Chung, Tae-Jin Yun, and Kwang-Seon Abn. "An RFID Mutual Authentication Protocol Using One-Time Random Number." Journal of Korean Institute of Communications and Information Sciences 36, no. 7B (July 30, 2011): 858–67. http://dx.doi.org/10.7840/kics.2011.36b.7.858.
Full textKim, Young-Back, Sung-Soo Kim, Kyung-Ho Chung, Soo-Yong Kim, Tae-Jin Yun, and Kwang-Seon Ahn. "A Vulnerability Analysis of Multi-Context RFID Mutual Authentication Protocol." Journal of the Korea Society of Computer and Information 18, no. 10 (October 31, 2013): 71–80. http://dx.doi.org/10.9708/jksci.2013.18.10.071.
Full textChen, Bing-Chang, Her-Tyan Yeh, and Che-Chiang Wang. "The construction of mobile RFID authentication mechanism and relative ownership transfer protocols for supply chain." Engineering Computations 33, no. 6 (August 1, 2016): 1825–34. http://dx.doi.org/10.1108/ec-08-2015-0252.
Full textJingxian Zhou, Yajian Zhou, Feng Xiao, Miao Zhang, and Xinxin Niu. "Efficient and Secure RFID Mutual Authentication Protocol without Sharing Key." International Journal of Advancements in Computing Technology 4, no. 15 (September 30, 2012): 319–27. http://dx.doi.org/10.4156/ijact.vol4.issue15.37.
Full textBassil, Ramzi, Wissam El-Beaino, Wassim Itani, Ayman Kayssi, and Ali Chehab. "PUMAP: A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol." International Journal of RFID Security and Cryptography 2, no. 1 (June 1, 2013): 58–66. http://dx.doi.org/10.20533/ijrfidsc.2046.3715.2013.0008.
Full textBandal, Amol. "RFID Security Using Lightweight Mutual Authentication and Ownership Transfer Protocol." International Journal of Ad hoc, Sensor & Ubiquitous Computing 3, no. 3 (June 30, 2012): 123–33. http://dx.doi.org/10.5121/ijasuc.2012.3309.
Full textZHANG, Nan, and Jianhua ZHANG. "Research and security analysis on open RFID mutual authentication protocol." Journal of Computer Applications 33, no. 1 (September 22, 2013): 131–34. http://dx.doi.org/10.3724/sp.j.1087.2013.00131.
Full textPateriya, R. K., and Sangeeta Sharma. "An Ultralightweight Mutual Authentication Protocol for Low Cost RFID Tags." International Journal of Computer Applications 25, no. 10 (July 31, 2011): 28–35. http://dx.doi.org/10.5120/3148-4352.
Full textSun, Da-Zhi, and Ji-Dong Zhong. "Cryptanalysis of a Hash Based Mutual RFID Tag Authentication Protocol." Wireless Personal Communications 91, no. 3 (July 23, 2016): 1085–93. http://dx.doi.org/10.1007/s11277-016-3513-4.
Full textSidorov, Michail, Ming Tze Ong, Ravivarma Vikneswaren Sridharan, Junya Nakamura, Ren Ohmura, and Jing Huey Khor. "Ultralightweight Mutual Authentication RFID Protocol for Blockchain Enabled Supply Chains." IEEE Access 7 (2019): 7273–85. http://dx.doi.org/10.1109/access.2018.2890389.
Full text