Articles with "rfid authentication" as a keyword



Photo by markusspiske from unsplash

Provably privacy analysis and improvements of the lightweight RFID authentication protocols

Sign Up to like & get
recommendations!
Published in 2020 at "Wireless Networks"

DOI: 10.1007/s11276-019-02037-z

Abstract: Radio Frequency Identification (RFID) systems authenticate products as well as people without any physical contact. Using RFID systems is an inevitable part of recent identifying and shopping affairs. However, RFID systems have huge hardware limitations… read more here.

Keywords: rfid authentication; authentication; lightweight rfid; weak privacy ... See more keywords
Photo from wikipedia

An Improved RFID Authentication Protocol Based on Group Anonymous Model

Sign Up to like & get
recommendations!
Published in 2018 at "Wireless Personal Communications"

DOI: 10.1007/s11277-018-5964-2

Abstract: Aiming at the security and privacy, and authentication efficiency shortages of existing RFID authentication protocol, an improved scheme is proposed based on Alavi et al.’s protocol. Firstly, in order to resist against replay attack, we… read more here.

Keywords: rfid authentication; group; authentication; protocol ... See more keywords
Photo by markusspiske from unsplash

Efficient Mobile RFID Authentication Protocol for Smart Logistics Targets Tracking

Sign Up to like & get
recommendations!
Published in 2023 at "IEEE Access"

DOI: 10.1109/access.2023.3234959

Abstract: Target tracking is one of the problems existing in the supply chain management. The use of radio frequency identification (RFID) in target tracking helps improve the monitoring accuracy and status visibility of the tracked target.… read more here.

Keywords: authentication; rfid authentication; authentication protocol; mobile rfid ... See more keywords