Cargando…
Comparison and Feasibility of Various RFID Authentication Methods Using ECC
Radio frequency identification (RFID) is a technology that has grown in popularity and in the applications of use. However, there are major issues regarding security and privacy with respect to RFID technology which have caught the interest of many researchers. There are significant challenges which...
Autores principales: | Alexander, Pagán, Baashirah, Rania, Abuzneid, Abdelshakour |
---|---|
Formato: | Online Artículo Texto |
Lenguaje: | English |
Publicado: |
MDPI
2018
|
Materias: | |
Acceso en línea: | https://www.ncbi.nlm.nih.gov/pmc/articles/PMC6164036/ https://www.ncbi.nlm.nih.gov/pubmed/30200493 http://dx.doi.org/10.3390/s18092902 |
Ejemplares similares
-
Survey on Prominent RFID Authentication Protocols for Passive Tags
por: Baashirah, Rania, et al.
Publicado: (2018) -
Survey: Vulnerability Analysis of Low-Cost ECC-Based RFID Protocols against Wireless and Side-Channel Attacks
por: Gabsi, Souhir, et al.
Publicado: (2021) -
SKINNY-Based RFID Lightweight Authentication Protocol
por: Xiao, Liang, et al.
Publicado: (2020) -
A Lightweight RFID Mutual Authentication Protocol with PUF
por: Zhu, Feng, et al.
Publicado: (2019) -
A Provably-Secure ECC-Based Authentication Scheme for Wireless Sensor Networks
por: Nam, Junghyun, et al.
Publicado: (2014)