2018 9th IEEE Annual Ubiquitous Computing, Electronics &Amp; Mobile Communication Conference (UEMCON) 2018
DOI: 10.1109/uemcon.2018.8796656
|View full text |Cite
|
Sign up to set email alerts
|

Improve Healthcare Safety Using Hash-Based Authentication Protocol for RFID Syste

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2019
2019
2021
2021

Publication Types

Select...
2
1

Relationship

1
2

Authors

Journals

citations
Cited by 3 publications
(2 citation statements)
references
References 25 publications
0
2
0
Order By: Relevance
“…In some protocols, the back-end server must make a linear search for the tag ID in the database which causes scalability issues. One solution is to group the tags as made by Mansoor, 2019 andBaashirah, 2018).…”
Section: Discussionmentioning
confidence: 99%
“…In some protocols, the back-end server must make a linear search for the tag ID in the database which causes scalability issues. One solution is to group the tags as made by Mansoor, 2019 andBaashirah, 2018).…”
Section: Discussionmentioning
confidence: 99%
“…In comparison to EMA protocol, EECC protocol resulted in better performance and security resistance to impersonate and forward security attacks. However, Baashirah et al [13] found that Zhang and Qi's protocol is vulnerable to forward traceability and reader impersonate attack, as an adversary can compromise the private key of the reader by obtaining the tag's secret identifier.…”
Section: Simple-weight Protocolsmentioning
confidence: 99%