Ads
-
Related paper
- Vulnerabilities and Improvements on HRAP+, a Hash-Based RFID Authentication Protocol
- A Strengthened Version of a Hash-based RFID Server-less Security Scheme
- ALGORITHMIC DESIGN AND ANALYSIS OF CRYPTOGRAPHIC SHA - 256 HASH FUNCTION WITH PROPOSED SHA - 288 HASH MODEL
- DESIGN AND IMPLEMENTATION OF GEOMETRIC BASED CRYPTOGRAPHIC HASH ALGORITHM: ASH-256
- IoT: Effective Authentication System (EAS) using Hash based Encryption on RFID Attacks
- Modification Application of Key Metrics 13x13 Cryptographic Algorithm Playfair Cipher and Combination with Linear Feedback Shift Register (LFSR) on Data Security Based on Mobile Android
- Bundle Security Protocol of Space DTNs Using Cryptographic Algorithm
- Security Analysis and Improvement of Wei-Chi Ku and Yi-Han Chen’s RFID protocol
- Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags
- Performance Evaluation of Slotted Aloha Anti-Collision Protocol for Mobile RFID Tags Identification using NHPP