2016
DOI: 10.1007/s12083-016-0443-6
|View full text |Cite
|
Sign up to set email alerts
|

An ultra-lightweight RFID authentication scheme for mobile commerce

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
25
0

Year Published

2017
2017
2021
2021

Publication Types

Select...
6
1

Relationship

1
6

Authors

Journals

citations
Cited by 40 publications
(26 citation statements)
references
References 16 publications
0
25
0
Order By: Relevance
“…Generally, MFA applications could be divided into three market-related groups: (i) commercial applications [49,50], i.e., account login, e-commerce, ATM, physical access control, etc. ; (ii) governmental applications [51,52], i.e., identity documents, government ID, passport, driver's license, social security, border control, etc.…”
Section: Mul�-factor Authen�ca�onmentioning
confidence: 99%
“…Generally, MFA applications could be divided into three market-related groups: (i) commercial applications [49,50], i.e., account login, e-commerce, ATM, physical access control, etc. ; (ii) governmental applications [51,52], i.e., identity documents, government ID, passport, driver's license, social security, border control, etc.…”
Section: Mul�-factor Authen�ca�onmentioning
confidence: 99%
“…Customers can buy anything they wish in supermarkets like Wal-Mart via QR code payment [8] . In addition, people can also use their phones to perform many of their daily activities, such as buying a film ticket, purchasing a cup of coffee online, or paying an automobile court fine [9] . As such, the mobile-payment process has become a very important part of e-commerce, and has developed into a convenient and relatively reliable technology.…”
Section: Related Workmentioning
confidence: 99%
“…Our contribution: The contribution of this paper is summarized as follows: •At first, we analyze the security of the Fan et al 's authentication protocol •In order to enhance the security of Fan et al 's protocol, we remedy the vulnerabilities found in their scheme. •We formally and informally analyze the security of our proposed protocol, and show that our scheme is secure against various known attacks including the attacks found in Fan et al 's scheme. •Our scheme is shown to be as efficient as Fan et al 's scheme and can be used for low‐cost RFID systems in m‐commerce. …”
Section: Introductionmentioning
confidence: 98%
“…Recently, an ultra‐lightweight RFID authentication protocol has been proposed by Fan et al with the claim of being fit for m‐commerce . In this protocol, the authors employed simple operations such as bitwise XOR (⊕) and addition modulo 2 L ( + ) and also shift operation (called R R method), they also claimed that their protocol is secure and efficient enough.…”
Section: Introductionmentioning
confidence: 99%
See 1 more Smart Citation