Our system is currently under heavy load due to increased usage. We're actively working on upgrades to improve performance. Thank you for your patience.
2018
DOI: 10.1002/cpe.4931
|View full text |Cite
|
Sign up to set email alerts
|

One‐round provably secure yoking‐proof for RFID applications

Abstract: Summary The yoking‐proof is the evidence that two or more RFID (Radio Frequency Identification) tags have been scanned simultaneously. Thanks to the IoT (Internet of Things), the yoking‐proof scheme becomes a very useful mechanism in many application areas such as health care and supply chain. However, the existing yoking‐proof schemes require two or more rounds of communication to generate the yoking‐proof. Following our idea presented in IEEE TrustCom 2017, we further investigate how to design the one‐round … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2019
2019
2019
2019

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(1 citation statement)
references
References 19 publications
0
1
0
Order By: Relevance
“…However, existing yoking‐proof scheme requires two or more rounds of communication to generate the yoking‐proof. Sun et al investigate how to design the one‐round yoking‐proof scheme with computational efficiency. The scheme is designed with a new timestamp‐based scheme for the RFID tag pair.…”
Section: Scanning the Issuementioning
confidence: 99%
“…However, existing yoking‐proof scheme requires two or more rounds of communication to generate the yoking‐proof. Sun et al investigate how to design the one‐round yoking‐proof scheme with computational efficiency. The scheme is designed with a new timestamp‐based scheme for the RFID tag pair.…”
Section: Scanning the Issuementioning
confidence: 99%