|
|
|
Ali A. Yassin, Jian Yao and Shiyao Han
In 2009, Xu et al. presented a safe, dynamic, id-based on remote user authentication method that has several advantages such as freely chosen passwords and mutual authentication. In this paper, we review the Xu?Zhu?Feng scheme and indicate many shortcomi...
ver más
|
|
|
|
|
|
Suleyman Kardas,Serkan Celik,Mehmet Sariyuce,Albert Levi
Pág. 128 - 136
Radio Frequency IDentification based systems are getting pervasively deployed in many real-life applications in various settings for identification and authentication of remote objects. However, the messages that are transmitted over a insecure channel, ...
ver más
|
|
|
|
|
|
Raghav V. Sampangi,Srinivas Sampalli
Pág. 44 - 56
Radio Frequency Identification (RFID) is a technology that is very popular due to the simplicity in its technology and high adaptability in a variety of areas. The simplicity in the technology, however, comes with a caveat ? RFID tags have severe resourc...
ver más
|
|
|