2015
DOI: 10.2498/cit.1002549 View full text |Buy / Rent full text
|
|

Abstract: Radio frequency identification (RFID) has spread into many fields. Its security and privacy has received more and more attention. Based on traditional authentication protocols, some other branches related to practical applications have been introduced including server-less authentication and searching protocols. The server-less searching protocol is extended from server-less authentication protocol and both of them are executed without the support from the backend servers. Through analyzing some proposed proto… Show more

Help me understand this report

Search citation statements

Order By: Relevance
Select...
1
0
1
0

Year Published

2020
2020
2020
2020

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

0
1
0
Order By: Relevance
“…Therefore, to cover such scenarios, several serverless authentication protocols have been proposed in the literature [18], [19], [20], [21], [22], [23], [24]. However, when two parties are communicating over a public channel then the adversary could affect the transferred messages, for example to do a Manin-the-Middle Attack [25], this is the case for the server-reader communication also.…”
Section: Introductionmentioning
Create an account to read the remaining citation statements from this report. You will also get access to:
  • Search over 1.2b+ citation statments to see what is being said about any topic in the research literature
  • Advanced Search to find publications that support or contrast your research
  • Citation reports and visualizations to easily see what publications are saying about each other
  • Browser extension to see Smart Citations wherever you read research
  • Dashboards to evaluate and keep track of groups of publications
  • Alerts to stay on top of citations as they happen
  • Automated reference checks to make sure you are citing reliable research in your manuscripts
  • 14 day free preview of our premium features.

Trusted by researchers and organizations around the world

Over 130,000 students researchers, and industry experts at use scite

See what students are saying

rupbmjkragerfmgwileyiopcupepmcmbcthiemesagefrontiersapsiucrarxivemeralduhksmucshluniversity-of-gavle
“…Therefore, to cover such scenarios, several serverless authentication protocols have been proposed in the literature [18], [19], [20], [21], [22], [23], [24]. However, when two parties are communicating over a public channel then the adversary could affect the transferred messages, for example to do a Manin-the-Middle Attack [25], this is the case for the server-reader communication also.…”
Section: Introductionmentioning