Sign Up to like & get
recommendations!
0
Published in 2020 at "Wireless Networks"
DOI: 10.1007/s11276-019-02037-z
Abstract: Radio Frequency Identification (RFID) systems authenticate products as well as people without any physical contact. Using RFID systems is an inevitable part of recent identifying and shopping affairs. However, RFID systems have huge hardware limitations…
read more here.
Keywords:
rfid authentication;
authentication;
lightweight rfid;
weak privacy ... See more keywords
Sign Up to like & get
recommendations!
0
Published in 2019 at "Journal of Computer Science and Technology"
DOI: 10.1007/s11390-019-1961-5
Abstract: Time-division multiple access (TDMA) and code-division multiple access (CDMA) are two technologies used in digital cellular networks. The authentication protocols of TDMA networks have been proven to be vulnerable to side-channel analysis (SCA), giving rise…
read more here.
Keywords:
authentication;
cellular networks;
protocols cdma;
side channel ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2023 at "Sensors"
DOI: 10.3390/s23115075
Abstract: Satellite–ground integrated networks (SGIN) are in line with 6th generation wireless network technology (6G) requirements. However, security and privacy issues are challenging with heterogeneous networks. Specifically, although 5G authentication and key agreement (AKA) protects terminal…
read more here.
Keywords:
authentication;
ground integrated;
roaming authentication;
satellite ground ... See more keywords