Kim et al., 2014 - Google Patents
Single tag sharing scheme for multiple-object RFID applicationsKim et al., 2014
- Document ID
- 4567084325547642517
- Author
- Kim J
- Chung K
- Jung J
- Publication year
- Publication venue
- Multimedia tools and applications
External Links
Snippet
RFID systems have been widely adopted in various industrial as well as personal applications. However, traditional RFID systems are limited to address only one tag for each application object. This limitation hinders the usability of RFID applications because it is …
- 238000000034 method 0 abstract description 37
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Cho et al. | Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol | |
CN104115442B (en) | RFID bidirectional authentication method based on asymmetric secret key and Hash function | |
Cheng et al. | Authenticated RFID security mechanism based on chaotic maps | |
Chen et al. | An ownership transfer scheme using mobile RFIDs | |
CN101882197A (en) | A Hierarchical Key Based RFID Interrogation-Response Security Authentication Method | |
Chen et al. | A secure ownership transfer protocol using EPCglobal Gen-2 RFID | |
Singh et al. | Security Attacks on RFID and their Countermeasures | |
Li et al. | Security and privacy on authentication protocol for low-cost RFID | |
Zhou et al. | A lightweight anti-desynchronization RFID authentication protocol | |
Miri | Advanced security and privacy for RFID technologies | |
Mbarek et al. | Self-adaptive RFID authentication for Internet of Things | |
Kim et al. | Single tag sharing scheme for multiple-object RFID applications | |
Saxena et al. | A novel hash-based mutual RFID tag authentication protocol | |
Yeh et al. | Improvement of two lightweight RFID authentication protocols | |
Morshed et al. | Secure ubiquitous authentication protocols for RFID systems | |
Moradi et al. | Security analysis and strengthening of an RFID lightweight authentication protocol suitable for VANETs | |
Shi et al. | The Lightweight RFID Grouping‐Proof Protocols with Identity Authentication and Forward Security | |
Lee et al. | Privacy challenges in RFID systems | |
KR101162626B1 (en) | A secure and efficient method and RFID reader device of searching a RFID tag | |
Lee et al. | A New Privacy-preserving Path Authentication Scheme using RFID for Supply Chain Management. | |
KR101216993B1 (en) | A Low-Cost RFID Tag Search Method Preventing the Reuse of Mobile Reader's Tag-List | |
Xie et al. | TOA: a tag‐owner‐assisting RFID authentication protocol toward access control and ownership transfer | |
Dawoud et al. | HEADA: a low cost RFID authentication technique using homomorphic encryption for key generation | |
Yin et al. | Keep all mobile users′ whereabouts secure: A radio frequency identification protocol anti‐tracking in 5G | |
Anandhi et al. | An RFID cloud authentication protocol for object tracking system in supply chain management |