On the Security of Moessner’s and Khan’s Authentication Scheme for Passive EPCglobal C1G2 RFID Tags

Faculty Computer Science Year: 2013
Type of Publication: ZU Hosted Pages: 419-425
Authors:
Journal: International Journal of Network Security National Chung Hsing University Volume: 16
Keywords : , , Security , Moessner’s , Khan’s Authentication Scheme , Passive    
Abstract:
RFID technology is one of the most promising automatic data collection technologies. It uses radio waves to identify object. Through automatic and real-time data acquisition, this technology can give a great benefit to various industries b
   
     
 
       

Author Related Publications

  • Walid Ibrahim Ibrahim Khedr, "An end-to-end ID-Based Encryption and Authentication Scheme for Short Message Service in GSM Networks", Advanced Institute of Convergence IT, 2013 More
  • Walid Ibrahim Ibrahim Khedr, "On the Security of Anonymous Authentication Scheme for Mobile LEO Satellite Networks", Advanced Institute of Convergence IT, 2013 More
  • Walid Ibrahim Ibrahim Khedr, "SRFID: A hash-based security scheme for low cost RFID systems", Elsevier, 2013 More
  • Walid Ibrahim Ibrahim Khedr, "Enhanced inter-ASN handover authentication scheme for IEEE 802.16m network", Institution of Engineering and Technology United Kingdom, 2015 More
  • Walid Ibrahim Ibrahim Khedr, "Improved Lightweight Authentication Scheme For Ieee 802.11P Vehicle-to-Infrastructure Communications", Old City Publishing, Inc., USA, 2015 More

Department Related Publications

  • Nabil Ali Mohamed Lashen, "A SURVEY OF ROUTING PROTOCOLS FOR WIRLESS MESH NETWORKS (WMNS)", AL-AZHAR ENGINEERING TEWELFTH INTERNATIONAL CONFERENCE, 2012 More
  • Khalied Mohamed Hosny, "Multimedia Security Using Encryption: A Survey", IEEE, 2023 More
  • Hanaa Mohamed Hamza Kamal, "Multimedia Security Using Encryption: A Survey", IEEE, 2023 More
  • Nabil Ali Mohamed Lashen, "Multimedia Security Using Encryption: A Survey", IEEE, 2023 More
Tweet