Author:
Huang Keke,Lin Changlu,Liu Yali
Publisher
Springer Nature Switzerland
Reference31 articles.
1. Huang, Y.J., Yuan, C.C., Chen, M.K., et al.: Hardware implementation of RFID mutual authentication protocol. IEEE Trans. Ind. Electron. 57(5), 1573–1582 (2009)
2. Aghili, S.F., Mala, H., Schindelhauer, C., et al.: Closed-loop and open-loop authentication protocols for blockchain-based IoT systems. Inf. Process. Manag. 58(4), 102568 (2021)
3. Salem, F.M., Amin, R.: A privacy-preserving RFID authentication protocol based on El-Gamal cryptosystem for secure TMIS. Inf. Sci. 527, 382–393 (2020)
4. Agrahari, A.K., Varma, S.: A provably secure RFID authentication protocol based on ECQV for the medical internet of things. Peer-to-Peer Netw. Appl. 14(3), 1277–1289 (2021)
5. Kumar, V., Ahmad, M., Mishra, D., et al.: RSEAP: RFID based secure and efficient authentication protocol for vehicular cloud computing. Veh. Commun. 22, 100213 (2020)
Cited by
1 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献