Sign Up to like & get
recommendations!
0
Published in 2020 at "Wireless Networks"
DOI: 10.1007/s11276-019-02037-z
Abstract: Radio Frequency Identification (RFID) systems authenticate products as well as people without any physical contact. Using RFID systems is an inevitable part of recent identifying and shopping affairs. However, RFID systems have huge hardware limitations…
read more here.
Keywords:
rfid authentication;
authentication;
lightweight rfid;
weak privacy ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "Wireless Personal Communications"
DOI: 10.1007/s11277-018-5964-2
Abstract: Aiming at the security and privacy, and authentication efficiency shortages of existing RFID authentication protocol, an improved scheme is proposed based on Alavi et al.’s protocol. Firstly, in order to resist against replay attack, we…
read more here.
Keywords:
rfid authentication;
group;
authentication;
protocol ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3234959
Abstract: Target tracking is one of the problems existing in the supply chain management. The use of radio frequency identification (RFID) in target tracking helps improve the monitoring accuracy and status visibility of the tracked target.…
read more here.
Keywords:
authentication;
rfid authentication;
authentication protocol;
mobile rfid ... See more keywords