SRFID: A hash-based security scheme for low cost RFID systems

Faculty Computer Science Year: 2013
Type of Publication: ZU Hosted Pages: 89–98
Authors:
Journal: Egyptian Informatics Journal Elsevier Volume: 13
Keywords : SRFID: , hash-based security scheme , , cost RFID systems    
Abstract:
Radio Frequency Identification (RFID) technology is a promising technology. It uses radio waves to identify objects. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries by improvi
   
     
 
       

Author Related Publications

  • Walid Ibrahim Ibrahim Khedr, "An end-to-end ID-Based Encryption and Authentication Scheme for Short Message Service in GSM Networks", Advanced Institute of Convergence IT, 2013 More
  • Walid Ibrahim Ibrahim Khedr, "On the Security of Anonymous Authentication Scheme for Mobile LEO Satellite Networks", Advanced Institute of Convergence IT, 2013 More
  • Walid Ibrahim Ibrahim Khedr, "On the Security of Moessner’s and Khan’s Authentication Scheme for Passive EPCglobal C1G2 RFID Tags", National Chung Hsing University, 2013 More
  • Walid Ibrahim Ibrahim Khedr, "Enhanced inter-ASN handover authentication scheme for IEEE 802.16m network", Institution of Engineering and Technology United Kingdom, 2015 More
  • Walid Ibrahim Ibrahim Khedr, "Improved Lightweight Authentication Scheme For Ieee 802.11P Vehicle-to-Infrastructure Communications", Old City Publishing, Inc., USA, 2015 More

Department Related Publications

  • Walid Ibrahim Ibrahim Khedr, "On the Security of Anonymous Authentication Protocol for Mobile Pay-TV", Scientific Research Publishing USA, 2015 More
  • Khalied Mohamed Hosny, "Highly accurate and numerically stable higher order QPCET moments for color image representation", Elsevier, 2017 More
  • Khalied Mohamed Hosny, "Robust color image watermarking using invariant quaternion Legendre-Fourier moments", Springer, 2018 More
  • Nabil Ali Mohamed Lashen, "Copy-for-duplication forgery detection in colour images using QPCETMs and subimage approach", IET Image processing, 2019 More
  • Nabil Ali Mohamed Lashen, "A hybrid Technique for Data Compression", International Journal of Digital Content Technology and its Applications (JDCTA), 2015 More
Tweet