Network Security
1. RSPAE: RFID Search Protocol based on Authenticated Encryption

M. Eslamnezhad Namin; M. Hosseinzadeh; N. Bagheri; A. Khademzadeh

Volume 6, Issue 2 , Summer and Autumn 2018, , Pages 179-192

  Search protocols are among the main applications of RFID systems. Since a search protocol should be able to locate a certain tag among many tags, not only it should be secure against RFID threats but also it should be affordable. In this article, an RFID-based search protocol will be presented. We use ...  Read More