The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
A lightweight mutual authentication protocol is proposed for RFID systems in which both the tags and the reader can be authenticated to each other. The proposed protocol is based on the McEliece cryptosystem without requiring Radio Frequency Identification (RFID) tags to store the large matrices needed in the McEliece cryptosystem. Complex computational operations in the McEliece cryptosystem are...
The content of an Radio Frequency IDentification (RFID) tag should be protected from unauthorized access and only trusted readers should be able to modify the data on the tag. Providing security for RFID systems is a challenging task mainly due to the hardware limitations and economical constraints of RFID systems. In this work, we focus on the problem of authenticating readers to RFID tags or Backward...
Online Social Networks (OSN) have become widely popular in recent years. OSN enable people to connect with their friends based on sharing information about their personal life. There are some serious privacy problems that need to be resolved in existing OSN: Firstly, there has to be a method to protect user-generated data from OSN providers. Secondly, a fully flexible and dynamic access control mechanism...
An efficient authentication mechanism is proposed for RFID tags, based on error-correcting codes. The proposed scheme is an asymmetric design benefiting from advantages of the public-key infrastructure. The security of our protocol is guaranteed based on the difficulty of the syndrome decoding problem. Our protocol is rearranged in a novel way to meet the practical requirements of RFID tags. Complex...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.