4.4 Article

A Secure and Privacy Friendly ECC Based RFID Authentication Protocol for Practical Applications

相关参考文献

注意:仅列出部分参考文献,下载原文获取全部文献信息。
Article Computer Science, Information Systems

Public key versus symmetric key cryptography in client-server authentication protocols

An Braeken

Summary: This paper points out the need for protocol designers to rethink the use of heavier constructions compared to symmetric key-based mechanisms in order to fully utilize their inherent strength. It also mentions the differences in advantages and disadvantages between public key and symmetric key protocols.

INTERNATIONAL JOURNAL OF INFORMATION SECURITY (2022)

Article Computer Science, Hardware & Architecture

Highly Efficient and Re-Executable Private Function Evaluation With Linear Complexity

Osman Bicer et al.

Summary: This article proposes a novel and secure two-party private function evaluation (2PFE) scheme based on the DDH assumption, with a reusability feature. The scheme achieves linear complexity and a small number of rounds.

IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING (2022)

Article Computer Science, Information Systems

A lightweight mutual authentication and key agreement protocol for remote surgery application in Tactile Internet environment

Ismaila Adeniyi Kamil et al.

Summary: The emergence of 5G networks has revolutionized cyberspace with its ultra-low latency, high capacity, and reliable connections. One technological innovation, the Tactile Internet, supports various real-time interaction applications including remote surgery in ehealthcare. However, without proper security measures, unauthorized access to robotic systems in Tactile Internet-assisted surgeries could lead to disastrous consequences, emphasizing the importance of developing efficient security protocols to ensure the safety of human lives.

COMPUTER COMMUNICATIONS (2021)

Article Computer Science, Information Systems

A provably secure RFID authentication protocol based on ECQV for the medical internet of things

Abhay Kumar Agrahari et al.

Summary: RFID technology is widely used in various medical sectors, raising security and privacy concerns. An elliptic curve based authentication protocol is proposed to secure healthcare data, providing mobility, scalability, security, and privacy.

PEER-TO-PEER NETWORKING AND APPLICATIONS (2021)

Article Telecommunications

RSEAP2: An enhanced version of RSEAP, an RFID based authentication protocol for vehicular cloud computing

Masoumeh Safkhani et al.

Summary: RSEAP, a RFID based authentication protocol for vehicular cloud computing, claimed to be secure and efficient, is challenged in this article. The protocol was found to be vulnerable to tag and reader impersonation attacks as well as relay attacks. By proposing patches and introducing RSEAP2, a more secure and efficient protocol was developed without increasing computational and communication costs.

VEHICULAR COMMUNICATIONS (2021)

Article Computer Science, Information Systems

An enhanced scalable and secure RFID authentication protocol for WBAN within an IoT environment

Sarah Izza et al.

Summary: Nowadays, IoT-based E-healthcare is a rapidly growing field due to advancements in wireless technologies and cloud computing. However, data security and patient privacy are major concerns in Wireless Body Area Networks (WBANs). To address these issues, researchers have proposed an efficient and enhanced RFID authentication scheme for IoT that ensures mutual authentication and patient data security.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2021)

Article Engineering, Electrical & Electronic

A scalable and secure RFID mutual authentication protocol using ECC for Internet of Things

Muhammad Naeem et al.

INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (2020)

Article Automation & Control Systems

Efficient and Secure Anonymous Authentication With Location Privacy for IoT-Based WBANs

Pandi Vijayakumar et al.

IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS (2020)

Article Telecommunications

RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing

Vinod Kumar et al.

VEHICULAR COMMUNICATIONS (2020)

Article Computer Science, Information Systems

ESEAP: ECC based secure and efficient mutual authentication protocol using smart card

Adesh Kumari et al.

JOURNAL OF INFORMATION SECURITY AND APPLICATIONS (2020)

Review Computer Science, Information Systems

Review of different classes of RFID authentication protocols

Alaauldin Ibrahim et al.

WIRELESS NETWORKS (2019)

Article Computer Science, Information Systems

An efficient and secure RFID authentication protocol using elliptic curve cryptography

Negin Dinarvand et al.

WIRELESS NETWORKS (2019)

Article Computer Science, Hardware & Architecture

An Efficient 2-Party Private Function Evaluation Protocol Based on Half Gates

Muhammed Ali Bingol et al.

COMPUTER JOURNAL (2019)

Article Computer Science, Hardware & Architecture

A secure ECC-based RFID mutual authentication protocol for internet of things

Amjad Ali Alamr et al.

JOURNAL OF SUPERCOMPUTING (2018)

Article Telecommunications

Are RNGs Achilles' Heel of RFID Security and Privacy Protocols?

Atakan Arslan et al.

WIRELESS PERSONAL COMMUNICATIONS (2018)

Article Telecommunications

A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography

Guoliang Liu et al.

WIRELESS PERSONAL COMMUNICATIONS (2018)

Review Chemistry, Analytical

Comparison and Feasibility of Various RFID Authentication Methods Using ECC

Pagan Alexander et al.

SENSORS (2018)

Article Telecommunications

Elliptic Curve Cryptography-Based RFID Authentication Resisting Active Tracking

Hung-Yu Chien

WIRELESS PERSONAL COMMUNICATIONS (2017)

Article Telecommunications

A provably secure RFID authentication protocol based on elliptic curve signature with message recovery suitable for m-Health environments

Mustapha Benssalah et al.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2017)

Proceedings Paper Computer Science, Hardware & Architecture

Three elliptic curve cryptography-based RFID authentication protocols for Internet of Things

Rui An et al.

ADVANCES ON BROAD-BAND WIRELESS COMPUTING, COMMUNICATION AND APPLICATIONS (2017)

Proceedings Paper Computer Science, Theory & Methods

The First Collision for Full SHA-1

Marc Stevens et al.

ADVANCES IN CRYPTOLOGY - CRYPTO 2017, PT I (2017)

Article Computer Science, Information Systems

Network layer inter-operation of Device-to-Device communication technologies in Internet of Things (IoT)

Oladayo Bello et al.

AD HOC NETWORKS (2017)

Article Computer Science, Information Systems

DKEM: Secure and efficient Distributed Key Establishment Protocol for Wireless Mesh Networks

Duygu Karaoglan Altop et al.

AD HOC NETWORKS (2017)

Article Health Care Sciences & Services

A Secure ECC-based RFID Mutual Authentication Protocol to Enhance Patient Medication Safety

Chunhua Jin et al.

JOURNAL OF MEDICAL SYSTEMS (2016)

Article Health Care Sciences & Services

A Provably Secure RFID Authentication Protocol Based on Elliptic Curve for Healthcare Environments

Mohammad Sabzinejad Farash et al.

JOURNAL OF MEDICAL SYSTEMS (2016)

Article Health Care Sciences & Services

A Secure RFID Mutual Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptography

Chunhua Jin et al.

JOURNAL OF MEDICAL SYSTEMS (2015)

Article Computer Science, Information Systems

An Analysis of RFID Authentication Schemes for Internet of Things in Healthcare Environment Using Elliptic Curve Cryptography

Debiao He et al.

IEEE INTERNET OF THINGS JOURNAL (2015)

Editorial Material Telecommunications

Future RFID technology and applications: visions and challenges

Daqiang Zhang et al.

TELECOMMUNICATION SYSTEMS (2015)

Article Computer Science, Information Systems

k-strong privacy for radio frequency identification authentication protocols based on physically unclonable functions

Suleyman Kardas et al.

WIRELESS COMMUNICATIONS & MOBILE COMPUTING (2015)

Article Computer Science, Information Systems

A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol

Yi-Pin Liao et al.

AD HOC NETWORKS (2014)

Article Computer Science, Information Systems

Proper RFID Privacy: Model and Protocols

Jens Hermans et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2014)

Article Health Care Sciences & Services

A Secure RFID Authentication Protocol for Healthcare Environments Using Elliptic Curve Cryptosystem

Zhenguo Zhao

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Health Care Sciences & Services

An Efficient RFID Authentication Protocol to Enhance Patient Medication Safety Using Elliptic Curve Cryptography

Zezhong Zhang et al.

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Health Care Sciences & Services

Lightweight ECC Based RFID Authentication Integrated with an ID Verifier Transfer Protocol

Debiao He et al.

JOURNAL OF MEDICAL SYSTEMS (2014)

Article Computer Science, Hardware & Architecture

An efficient mutual authentication RFID scheme based on elliptic curve cryptography

Jue-Sam Chou

JOURNAL OF SUPERCOMPUTING (2014)

Article Computer Science, Hardware & Architecture

Cryptanalysis and improvement of an efficient mutual authentication RFID scheme based on elliptic curve cryptography

Mohammad Sabzinejad Farash

JOURNAL OF SUPERCOMPUTING (2014)

Proceedings Paper Computer Science, Theory & Methods

Secure Multiparty Electronic Payments Using ECC Algorithm A Comparative Study

K. Ravikumar et al.

2014 WORLD CONGRESS ON COMPUTING AND COMMUNICATION TECHNOLOGIES (WCCCT 2014) (2014)

Article Computer Science, Information Systems

Privacy-Friendly Authentication in RFID Systems: On Sublinear Protocols Based on Symmetric-Key Cryptography

Gildas Avoine et al.

IEEE TRANSACTIONS ON MOBILE COMPUTING (2013)

Article Health Care Sciences & Services

An Efficient Key-Management Scheme for Hierarchical Access Control in E-Medicine System

Shuhua Wu et al.

JOURNAL OF MEDICAL SYSTEMS (2012)

Article Telecommunications

Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols

Chao Lv et al.

TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES (2012)

Article Telecommunications

Privacy Analysis of Forward and Backward Untraceable RFID Authentication Schemes

Raphael C. -W. Phan et al.

WIRELESS PERSONAL COMMUNICATIONS (2011)

Article Computer Science, Information Systems

A framework for analyzing RFID distance bounding protocols

Gildas Avoine et al.

JOURNAL OF COMPUTER SECURITY (2011)

Article Computer Science, Hardware & Architecture

Elliptic-curve-based security processor for RFID

Yong Ki Lee et al.

IEEE TRANSACTIONS ON COMPUTERS (2008)

Proceedings Paper Computer Science, Theory & Methods

Public-key cryptography for RFID-tags

L. Batina et al.

FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS (2007)

Article Computer Science, Hardware & Architecture

The advantages of elliptic curve cryptography for wireless security

K Lauter

IEEE WIRELESS COMMUNICATIONS (2004)

Article Computer Science, Theory & Methods

The state of elliptic curve cryptography

N Koblitz et al.

DESIGNS CODES AND CRYPTOGRAPHY (2000)