2018
DOI: 10.1007/978-981-13-1882-5_14
|View full text |Cite
|
Sign up to set email alerts
|

A Lightweight Memory-Based Protocol Authentication Using Radio Frequency Identification (RFID)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1

Citation Types

0
3
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
3
2

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(3 citation statements)
references
References 7 publications
0
3
0
Order By: Relevance
“…On the other hand, Excel B. Villanueva et al [32] implemented the fifth version of the same block cipher to be implemented for e-payment purposes. The TEA cipher is another block cipher algorithm that is considerably utilized, especially for healthcare applications [22,29,38], due to its low resource usage and healthcare applications' real-time information requirement. ECC can be seen as widely used, as in [14,39], where this approach was implemented alongside several techniques such as the Digital Signature Algorithm (DSA), SHA-256, and CRC, and it can be part of a blockchain-based e-payment application with no consensus, since the users are initially verified [23], or zero-knowledge-based cryptography within Schnorr's scheme [33].…”
Section: Rfid Security Solutionsmentioning
confidence: 99%
“…On the other hand, Excel B. Villanueva et al [32] implemented the fifth version of the same block cipher to be implemented for e-payment purposes. The TEA cipher is another block cipher algorithm that is considerably utilized, especially for healthcare applications [22,29,38], due to its low resource usage and healthcare applications' real-time information requirement. ECC can be seen as widely used, as in [14,39], where this approach was implemented alongside several techniques such as the Digital Signature Algorithm (DSA), SHA-256, and CRC, and it can be part of a blockchain-based e-payment application with no consensus, since the users are initially verified [23], or zero-knowledge-based cryptography within Schnorr's scheme [33].…”
Section: Rfid Security Solutionsmentioning
confidence: 99%
“…TPP resolves key exchange by using three stages of message transfer. TPP has been used to enable internet secure transport protocol [12], to encrypt heterogeneous network messages with shared keys [13], to secure data flow in IoT networks [14] and to protect RFID networks [15]. TPP processes involve message exchanges between transmitter and receiver.…”
Section: Introductionmentioning
confidence: 99%
“…Today Indonesian Identity Card (e-KTP) have NFC Technology inside it. It is a new technology safer than standard RFID [1] which has much evaluation [2][3][4][5][6][7][8]. The NFC Technology in e-KTP never been used until this time.…”
Section: Introductionmentioning
confidence: 99%