With the rapid developments of the IoT (Internet of Things) and the cloud computing, cloud-based RFID systems attract more attention. Users can reduce their cost of deploying and maintaining the RFID system by purchasing cloud services. However, the security threats of ... View more
Wei, C.-H., Hwang, M.-S., Chin, A. Y.-H.. A mutual authentication protocol for RFID.
IT Professional. 2011; 13 (2): 20-24
Dong, Q., Zhang, J., Wei, L.. A SHA-3 based RFID mutual authentication protocol and its implementation.
He, D., Kumar, N., Chilamkurti, N.. Lightweight ECC based RFID authentication integrated with an ID verifier transfer protocol.
Journal of Medical Systems. 2014; 38, article 116
Lee, C.-F., Chien, H.-Y., Laih, C.-S.. Server-less RFID authentication and searching protocol with enhanced security.
International Journal of Communication Systems. 2012; 25 (3): 376-385
Hoque, M. E., Rahman, F., Ahamed, S. I., Park, J. H.. Enhancing privacy and security of RFID system with serverless authentication and search protocols in pervasive environments.
Wireless Personal Communications. 2010; 55 (1): 65-79
Tan, C., Sheng, B., Li, Q.. Secure and server-less RFID authentication and search protocols.
IEEE Transactions on Wireless Communications. 2008; 7 (4): 1400-1407
Dabas, C., Gupta, J. P.. A cloud computing architecture framework for scalable RFID. : 441-444
Yuan, Z.-W., Li, Q.. Research on data processing of RFID middleware based on cloud computing. : 663-671
Chattopadhyay, A., Prabhu, B. S., Gadh, R.. Web based RFID asset management solution established on cloud services. : 292-299
Chu, L., Wu, S.-J.. An integrated building fire evacuation system with RFID and cloud computing. : 17-20