PERCOMW '04 Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops
AINA '05 Proceedings of the 19th International Conference on Advanced Information Networking and Applications - Volume 2
A New Method to Guard Inpatient Medication Safety by the Implementation of RFID
Journal of Medical Systems
Elliptic-Curve-Based Security Processor for RFID
IEEE Transactions on Computers
ECC Is Ready for RFID --- A Proof in Silicon
Selected Areas in Cryptography
A RFID Grouping Proof Protocol for Medication Safety of Inpatient
Journal of Medical Systems
Privacy-preserving ECC-based grouping proofs for RFID
ISC'10 Proceedings of the 13th international conference on Information security
Journal of Medical Systems
Two RFID-based Solutions to Enhance Inpatient Medication Safety
Journal of Medical Systems
Fuzzy Logic-Based Approach to Detecting a Passive RFID Tag in an Outpatient Clinic
Journal of Medical Systems
A New Specimen Management System Using RFID Technology
Journal of Medical Systems
Low Cost RFID Real Lightweight Binding Proof Protocol for Medication Errors and Patient Safety
Journal of Medical Systems
Patient Safety Through RFID: Vulnerabilities in Recently Proposed Grouping Protocols
Journal of Medical Systems
RFID-Enabled Healthcare Applications, Issues and Benefits: An Archival Analysis (1997---2011)
Journal of Medical Systems
Two RFID Standard-based Security Protocols for Healthcare Environments
Journal of Medical Systems
Hi-index | 0.00 |
Several papers were proposed in which symmetric cryptography was used to design RFID grouping-proof for medication safety in the Journal of Medical Systems. However, if we want to ensure privacy, authentication and protection against the tracking of RFID-tags without losing system scalability, we must design an asymmetric cryptography-based RFID. This paper will propose a new ECC-based grouping-proof for RFID. Our ECC-based grouping-proof reduces the computation of tags and prevents timeout problems from occurring in n-party grouping-proof protocol. Based on asymmetric cryptography, the proposed scheme is practical, secure and efficient for medication applications.