4.6 Review

Survey on Prominent RFID Authentication Protocols for Passive Tags

Related references

Note: Only part of the references are listed.
Review Chemistry, Analytical

Comparison and Feasibility of Various RFID Authentication Methods Using ECC

Pagan Alexander et al.

SENSORS (2018)

Article Engineering, Electrical & Electronic

Untraceability Analysis of Two RFID Authentication Protocols

Chen Xiuqing et al.

CHINESE JOURNAL OF ELECTRONICS (2016)

Article Computer Science, Information Systems

EPC Gen2v2 RFID Standard Authentication and Ownership Management Protocol

Haifeng Niu et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2016)

Article Computer Science, Information Systems

Efficient serverless radio-frequency identification mutual authentication and secure tag search protocols with untrusted readers

Collins Mtita et al.

IET INFORMATION SECURITY (2016)

Article Chemistry, Multidisciplinary

Mutual Authentication Protocol for Role-Based Access Control Using Mobile RFID

Bing-Chang Chen et al.

APPLIED SCIENCES-BASEL (2016)

Proceedings Paper Computer Science, Information Systems

A secure authentication scheme for RFID systems

Prajnamaya Dass et al.

1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015 (2016)

Article Engineering, Electrical & Electronic

Implementation of a New RFID Authentication Protocol for EPC Gen2 Standard

Zilong Liu et al.

IEEE SENSORS JOURNAL (2015)

Article Computer Science, Hardware & Architecture

Secure Tag Search in RFID Systems Using Mobile Readers

Saravanan Sundaresan et al.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2015)

Article Business

ECC-based untraceable authentication for large-scale active-tag RFID systems

Yalin Chen et al.

ELECTRONIC COMMERCE RESEARCH (2015)

Article Computer Science, Information Systems

Managing RFID Data: Challenges, Opportunities and Solutions

Lei Xie et al.

IEEE COMMUNICATIONS SURVEYS AND TUTORIALS (2014)

Article Mathematics, Applied

On the security of RFID anti-counting security protocol (ACSP)

Masoumeh Safkhani et al.

JOURNAL OF COMPUTATIONAL AND APPLIED MATHEMATICS (2014)

Article Health Care Sciences & Services

A Secure RFID Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptosystem

Zhenguo Zhao

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Health Care Sciences & Services

An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography

Zezhong Zhang et al.

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Computer Science, Hardware & Architecture

An efficient mutual authentication RFID scheme based on elliptic curve cryptography

Jue-Sam Chou

JOURNAL OF SUPERCOMPUTING (2014)

Article Computer Science, Hardware & Architecture

Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography

Mohammad Sabzinejad Farash

JOURNAL OF SUPERCOMPUTING (2014)

Article Computer Science, Information Systems

Efficient detection of counterfeit products in large-scale RFID systems using batch authentication protocols

Farzana Rahman et al.

PERSONAL AND UBIQUITOUS COMPUTING (2014)

Article Computer Science, Information Systems

Session-based security enhancement of RFID systems for emerging open-loop applications

Junyu Wang et al.

PERSONAL AND UBIQUITOUS COMPUTING (2014)

Article Telecommunications

Simulation-Based Traceability Analysis of RFID Authentication Protocols

Mahdi R. Alagheband et al.

WIRELESS PERSONAL COMMUNICATIONS (2014)

Article Computer Science, Theory & Methods

Grouping-Proofs-Based Authentication Protocol for Distributed RFID Systems

Hong Liu et al.

IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS (2013)

Article Computer Science, Hardware & Architecture

Survivability Experiment and Attack Characterization for RFID

Yanjun Zuo

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2012)

Article Automation & Control Systems

Efficient Implementation of RFID Mutual Authentication Protocol

Yu-Jung Huang et al.

IEEE TRANSACTIONS ON INDUSTRIAL ELECTRONICS (2012)

Article Computer Science, Information Systems

Lightweight RFID Authentication with Forward and Backward Security

Mike Burmester et al.

ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2011)

Article Computer Science, Information Systems

A Lightweight Authentication Protocol for Low-Cost RFID

Hung-Yu Chien et al.

JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY (2010)

Article Automation & Control Systems

Conformation of EPC Class 1 Generation 2 standards RFID system with mutual authentication and privacy protection

Chin-Ling Chen et al.

ENGINEERING APPLICATIONS OF ARTIFICIAL INTELLIGENCE (2009)

Article Computer Science, Hardware & Architecture

Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards

Hung-Yu Chien et al.

COMPUTER STANDARDS & INTERFACES (2007)

Article Computer Science, Information Systems

Radio frequency identification (RFID)

CM Roberts

COMPUTERS & SECURITY (2006)

Article Engineering, Electrical & Electronic

Active attack against HB+:: a provably secure lightweight authentication protocol

H Gilbert et al.

ELECTRONICS LETTERS (2005)