Mutual Authentication Protocol Model For Low-Cost RFID Systems Based On Shelled Random Value
Designing a reliable secure low-cost protocol for radio-frequency identification (RFID) is difficult, standard cryptographic primitives can become a limitation for low-cost tags due to their costly large requirements in terms of circuit size, power consumption, and memory size. Therefore, ultraligh...
| Main Author: | al-Dala'ien, Mu'awya Naser Salam |
|---|---|
| Format: | Thesis |
| Language: | English |
| Published: |
2011
|
| Subjects: | |
| Online Access: | http://eprints.usm.my/42102/ |
| Abstract | Abstract here |
Similar Items
A RFID Protocol For Detecting The Existence Of A Single RFID Tag By Two RFID Readers
by: Tan , Aik Theng
Published: (2012)
by: Tan , Aik Theng
Published: (2012)
Improving The Efficiency Of Sip
Authentication Based On The
Pre-Calculated Look-Up Table
by: Jaber, Aws Naser
Published: (2013)
by: Jaber, Aws Naser
Published: (2013)
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
by: S. Alsayfi, Majed Salam
Published: (2010)
by: S. Alsayfi, Majed Salam
Published: (2010)
Internet Telephony Transport Protocol (ITTP): An Efficient Transport Protocol For Voip Applications
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011)
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011)
Segmentation Of Ultisequence Medical Images Using Random Walks Algorithm And Rough Sets Theory
by: Lim, Khai Yin
Published: (2017)
by: Lim, Khai Yin
Published: (2017)
A Mobile Learning Objects Compilation Framework Based On Semantic Web And Random Forest
by: Phillip, Rogers Bhalalusesa
Published: (2017)
by: Phillip, Rogers Bhalalusesa
Published: (2017)
Self-Verification Of Public-Key
Agreement Over Voip Using Random
Fusion Scheme
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
by: Alfin Syafalni, Alfin Syafalni
Published: (2016)
A Study On Determinants Of Rfid Adoption Intention Among Hajj Organizers In Indonesia And Malaysia And Its Strategic Information Systems Plan
by: Al-Hashedi, Abdullah Hussein Ahmed
Published: (2013)
by: Al-Hashedi, Abdullah Hussein Ahmed
Published: (2013)
Enhanced Techniques For Detection And Classification Of Neighbor Discovery Protocol Anomalies
by: Firas (M.H.) S., Najjar
Published: (2016)
by: Firas (M.H.) S., Najjar
Published: (2016)
The Dynamic Host Configuration Protocol Version 6 Security And Privacy Mechanism
by: Ibrahim, Ayman Khallel
Published: (2020)
by: Ibrahim, Ayman Khallel
Published: (2020)
Enhancing Security Protocol For Voip Communication Using Modified Vector Quantization
by: Jaafar, Mohd Yazid Mohd
Published: (2013)
by: Jaafar, Mohd Yazid Mohd
Published: (2013)
Enhancing The Quality Of Service In Mobile Networks Based On Nemo Basic Support Protocol
by: Alshaibani, Badiea Abdulkarem Mohammed
Published: (2018)
by: Alshaibani, Badiea Abdulkarem Mohammed
Published: (2018)
An Efficient Distributed Slotted Multi-Hop Wireless Mac Protocol For Internet Of Things
by: Sarvghadi, Mohammad Ali
Published: (2021)
by: Sarvghadi, Mohammad Ali
Published: (2021)
Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks
by: Alzyoud, Faisal Yousef Abed-alrahman
Published: (2011)
by: Alzyoud, Faisal Yousef Abed-alrahman
Published: (2011)
Hybrid Mac Protocol With Intra- Cluster Communications For Extending Wireless Sensor Network Lifetimes
by: Elsmany, Eyman Fathelrhman Ahmed
Published: (2019)
by: Elsmany, Eyman Fathelrhman Ahmed
Published: (2019)
Xcast Based Routing Protocol For Push To Talk Application In Mobile Ad Hoc Networks
by: Al-Zyoud, Faisal Yousef Abed-alrahman
Published: (2011)
by: Al-Zyoud, Faisal Yousef Abed-alrahman
Published: (2011)
An Efficient Safety System For Vanet Using Enhanced Message Dissemination Protocols With Channel Performance Control
by: Samara, Ghassan Abedalkarim Abdullah
Published: (2012)
by: Samara, Ghassan Abedalkarim Abdullah
Published: (2012)
Enhanced Bluetooth Low Energy 5 Aodv-Based Mesh Communication Protocol With Multipath Support
by: Ghori, Muhammad Rizwan
Published: (2023)
by: Ghori, Muhammad Rizwan
Published: (2023)
Multipath Cluster Based Routing Protocol For Non-Uniform Node Density Mobile Ad Hoc Networks
by: Mohammed Mahdi, Mohammed Abdo
Published: (2016)
by: Mohammed Mahdi, Mohammed Abdo
Published: (2016)
Mobile Cloud And Cloudlets Gaming System (Mccg) Using Clustered Destination-Sequenced Distance Vector Routing Protocol(C-DSDV)
by: Doraisamy, Vaithegy
Published: (2020)
by: Doraisamy, Vaithegy
Published: (2020)
Enhancement Of Login Process Multi-Server Conmmnication For Multimedia Conferencing System (Mcs) Using Distributed Lightweight Directory Access Protocol (Ldap).
by: Abu Saleh, Mohammad Abdelmo'ti
Published: (2010)
by: Abu Saleh, Mohammad Abdelmo'ti
Published: (2010)
Automated Federation Of Virtual Organization In Grid Using Select, Match, Negotiate And Expand (SMNE) Protocol [QA76.9.C58 C518 2008 f rb].
by: Cheng, Wai Khuen
Published: (2007)
by: Cheng, Wai Khuen
Published: (2007)
Parallel Quick-Skip Search Hybrid Algorithm For The Exact String Matching Problem.
by: Naser, Mustafa Abdulsahib
Published: (2010)
by: Naser, Mustafa Abdulsahib
Published: (2010)
An Efficiency Analysis Of Seaports Using Extended
Window Analysis, Malmquist Index And Simar-wilson
Approach
by: Naser Al-Eraqi , Ahmed Salem
Published: (2009)
by: Naser Al-Eraqi , Ahmed Salem
Published: (2009)
Identifying Criteria For The Implementation Of Augmented Reality In Malaysian Tourism Industry
by: Ahmed, Abdul Salam Waqar
Published: (2022)
by: Ahmed, Abdul Salam Waqar
Published: (2022)
Intelligent Air Conditioner System : User Acceptance Level Of Icons And Cost Saving Analysis
by: Lim, Seng Chee
Published: (2009)
by: Lim, Seng Chee
Published: (2009)
Intelligent Air Conditioner System: User Acceptance Level of ICONS and Cost Saving Analysis.
by: Lim, Seng Chee
Published: (2009)
by: Lim, Seng Chee
Published: (2009)
Static Hand Gesture Recognition Using Haar-Like Features
by: Wong, Kai Sin
Published: (2015)
by: Wong, Kai Sin
Published: (2015)
Optimized feature construction methods for data summarizations of relational data
by: Sze, Florence Sia Fui
Published: (2014)
by: Sze, Florence Sia Fui
Published: (2014)
A Statistical Approach Towards Worm Detection Using Cross-Relation Technique
by: Anbar, Mohammed F.R.
Published: (2013)
by: Anbar, Mohammed F.R.
Published: (2013)
Adapting And Enhancing Hybrid Computational Methods For RNA
Secondary Structure Prediction
by: Al-Khatib, Ra’ed Mohammad Ali
Published: (2011)
by: Al-Khatib, Ra’ed Mohammad Ali
Published: (2011)
Personalizable Models For Business-To-Business Information Interchange In Communication Layers
by: Ting, Tin Tin
Published: (2011)
by: Ting, Tin Tin
Published: (2011)
A False Alert Reduction And An Alert Score Assessment Framework For Intrusion Alerts
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
by: Al-Saedi, Karim Hashim Kraidi
Published: (2013)
Visualizing Phylogenetic Trees: Algorithms And Visual Comparison Techniques
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
by: Wan Zainon, Wan Mohd Nazmee
Published: (2011)
Heuristic-Based Ant Colony Optimization Algorithm For Protein Functional Module Detection In Protein Interaction Network
by: SALLIM, JAMALUDIN
Published: (2017)
by: SALLIM, JAMALUDIN
Published: (2017)
An optimized framework for header suppression of real time IPV6 traffic in multiprotocol label switching (MPLS) networks.
by: Mohammed, Imad Jasim
Published: (2011)
by: Mohammed, Imad Jasim
Published: (2011)
Harmony search-based fuzzy clustering algorithms for image segmentation.
by: Alia, Osama Moh’d Radi
Published: (2011)
by: Alia, Osama Moh’d Radi
Published: (2011)
Keyword Competition Approach In
Ranked Document Retrieval
by: Sihombing, Poltak
Published: (2010)
by: Sihombing, Poltak
Published: (2010)
Harmony search algorithms for ab initio protein tertiary structure prediction.
by: Rub, Mohammed Said Saleh Abual
Published: (2011)
by: Rub, Mohammed Said Saleh Abual
Published: (2011)
Enhanced and automated approaches for fish recognition and classification system
by: Samma, Ali Salem Ali
Published: (2011)
by: Samma, Ali Salem Ali
Published: (2011)
Similar Items
-
A RFID Protocol For Detecting The Existence Of A Single RFID Tag By Two RFID Readers
by: Tan , Aik Theng
Published: (2012) -
Improving The Efficiency Of Sip
Authentication Based On The
Pre-Calculated Look-Up Table
by: Jaber, Aws Naser
Published: (2013) -
Integrating Identity-Based Encryption (Ibe) In The Return Routability Protocol (Rrp) To Enhance Signals Security
In Mobile Ipv6.
by: S. Alsayfi, Majed Salam
Published: (2010) -
Internet Telephony Transport Protocol (ITTP): An Efficient Transport Protocol For Voip Applications
by: Abu-Alhaj, Mosleh Mohammad
Published: (2011) -
Segmentation Of Ultisequence Medical Images Using Random Walks Algorithm And Rough Sets Theory
by: Lim, Khai Yin
Published: (2017)
