„RFID Authentication“
Suchergebnisse
105 Treffer
-
Security Attacks and Enhancements to Chaotic Map-Based RFID Authentication Protocols
-
An efficient and secure RFID authentication protocol using elliptic curve cryptography
-
On the security of a new ultra-lightweight authentication protocol in IoT environment for RFID tags
-
Provably privacy analysis and improvements of the lightweight RFID authentication protocols
-
Efficient group authentication in RFID using secret sharing scheme
-
Review of different classes of RFID authentication protocols
-
A High Security RFID System Authentication Protocol Design Base on Cloud Computer
-
RFID and beyond - a survey on the most recent developments in wireless authentication systems
-
A secure ECC-based RFID mutual authentication protocol for internet of things
-
Breaking anonymity of some recent lightweight RFID authentication protocols
-
Security Enhancements of a Mutual Authentication Protocol Used in a HF Full-Fledged RFID Tag
-
A Secure PUF-Based Unilateral Authentication Scheme for RFID System
-
A Novel Authentication Management RFID Protocol Based on Elliptic Curve Cryptography
-
RFID Authentication
-
Biometric Supported Wireless Authentication
-
Radio frequency identification – security and privacy issues : 9th international workshop ; revised selected papers
-
RFID Technologies for Internet of Things
-
Radio frequency identification – security and privacy issues : 8th international workshop ; revised selected papers
-
Fast software encryption – 19th international workshop ; revised selected papers
-
RFID Security – Using Lightweight Cryptography