[go: up one dir, main page]
More Web Proxy on the site http://driver.im/

Kim et al., 2014 - Google Patents

Single tag sharing scheme for multiple-object RFID applications

Kim et al., 2014

Document ID
4567084325547642517
Author
Kim J
Chung K
Jung J
Publication year
Publication venue
Multimedia tools and applications

External Links

Snippet

RFID systems have been widely adopted in various industrial as well as personal applications. However, traditional RFID systems are limited to address only one tag for each application object. This limitation hinders the usability of RFID applications because it is …
Continue reading at link.springer.com (other versions)

Similar Documents

Publication Publication Date Title
Cho et al. Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol
CN104115442B (en) RFID bidirectional authentication method based on asymmetric secret key and Hash function
Cheng et al. Authenticated RFID security mechanism based on chaotic maps
Chen et al. An ownership transfer scheme using mobile RFIDs
CN101882197A (en) A Hierarchical Key Based RFID Interrogation-Response Security Authentication Method
Chen et al. A secure ownership transfer protocol using EPCglobal Gen-2 RFID
Singh et al. Security Attacks on RFID and their Countermeasures
Li et al. Security and privacy on authentication protocol for low-cost RFID
Zhou et al. A lightweight anti-desynchronization RFID authentication protocol
Miri Advanced security and privacy for RFID technologies
Mbarek et al. Self-adaptive RFID authentication for Internet of Things
Kim et al. Single tag sharing scheme for multiple-object RFID applications
Saxena et al. A novel hash-based mutual RFID tag authentication protocol
Yeh et al. Improvement of two lightweight RFID authentication protocols
Morshed et al. Secure ubiquitous authentication protocols for RFID systems
Moradi et al. Security analysis and strengthening of an RFID lightweight authentication protocol suitable for VANETs
Shi et al. The Lightweight RFID Grouping‐Proof Protocols with Identity Authentication and Forward Security
Lee et al. Privacy challenges in RFID systems
KR101162626B1 (en) A secure and efficient method and RFID reader device of searching a RFID tag
Lee et al. A New Privacy-preserving Path Authentication Scheme using RFID for Supply Chain Management.
KR101216993B1 (en) A Low-Cost RFID Tag Search Method Preventing the Reuse of Mobile Reader's Tag-List
Xie et al. TOA: a tag‐owner‐assisting RFID authentication protocol toward access control and ownership transfer
Dawoud et al. HEADA: a low cost RFID authentication technique using homomorphic encryption for key generation
Yin et al. Keep all mobile users′ whereabouts secure: A radio frequency identification protocol anti‐tracking in 5G
Anandhi et al. An RFID cloud authentication protocol for object tracking system in supply chain management