2013 IEEE International Conference on RFID (RFID) 2013
DOI: 10.1109/rfid.2013.6548151
|View full text |Cite
|
Sign up to set email alerts
|

Cloud-based RFID authentication

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
37
0

Year Published

2014
2014
2022
2022

Publication Types

Select...
4
3

Relationship

0
7

Authors

Journals

citations
Cited by 30 publications
(37 citation statements)
references
References 16 publications
0
37
0
Order By: Relevance
“…Password Authentication [15]- [18] A secure authentication mechanism using graphical password should be proposed in this paper for improving traditional authentication mechanism and let users access cloud services securely [15]. It is breakable by shoulder surfing attack.…”
Section: {2009-2011 Reports}mentioning
confidence: 99%
See 1 more Smart Citation
“…Password Authentication [15]- [18] A secure authentication mechanism using graphical password should be proposed in this paper for improving traditional authentication mechanism and let users access cloud services securely [15]. It is breakable by shoulder surfing attack.…”
Section: {2009-2011 Reports}mentioning
confidence: 99%
“…It is breakable by shoulder surfing attack. Secured Biometric Authentication [16], Biometric Authentication [17], RFID based authentication [18] and Eid Authentication [19] has its own drawbacks. 14 Authentication Protocol [20] Reported issues and proposed brief solutions on privileged access, authenticated access user types bug, vulnerability of platforms.…”
Section: {2009-2011 Reports}mentioning
confidence: 99%
“…The architecture consists of sensor, reader, and the backend server [21]. Reader delivers the message from the sensor to the backend server in this architecture, and sensor is certificated through the background database.…”
Section: Related Workmentioning
confidence: 99%
“…The model in Figure 2 can be used offline via mobile reader to authenticate the adaptive sensor [21]. The system consists of adaptive sensor, reader, and CA and is divided into two phases: initialization and certification.…”
Section: Related Workmentioning
confidence: 99%
See 1 more Smart Citation