An optimal class of symmetric key generation systems
Proc. of the EUROCRYPT 84 workshop on Advances in cryptology: theory and application of cryptographic techniques
A pairwise key predistribution scheme for wireless sensor networks
ACM Transactions on Information and System Security (TISSEC)
Untraceable RFID tags via insubvertible encryption
Proceedings of the 12th ACM conference on Computer and communications security
The benefit of using SIM application toolkit in the context of near field communication applications
ICMB '07 Proceedings of the International Conference on the Management of Mobile Business
NFC Devices: Security and Privacy
ARES '08 Proceedings of the 2008 Third International Conference on Availability, Reliability and Security
Security bootstrap model of key pre-sharing by polynomial group in mobile Ad Hoc Network
Journal of Network and Computer Applications
Message Authentication in Computationally Constrained Environments
IEEE Transactions on Mobile Computing
A Gen2-Based RFID Authentication Protocol for Security and Privacy
IEEE Transactions on Mobile Computing
Security analysis of the Song-Mitchell authentication protocol for low-cost RFID tags
IEEE Communications Letters
Review: Wireless sensor network key management survey and taxonomy
Journal of Network and Computer Applications
Review: A survey on security issues in service delivery models of cloud computing
Journal of Network and Computer Applications
Improved security for commercial container transports using an innovative active RFID system
Journal of Network and Computer Applications
Secure and Serverless RFID Authentication and Search Protocols
IEEE Transactions on Wireless Communications
Algebraic characterization of MDS group codes over cyclic groups
IEEE Transactions on Information Theory - Part 2
Evaluating opportunistic networks in disaster scenarios
Journal of Network and Computer Applications
Editorial: Advanced technologies for homeland defense and security
Journal of Network and Computer Applications
Hi-index | 0.00 |
Due to the proliferation of variety RFID applications supporting homeland security and defense missions, mobile devices need to store many different RFID tags to access multiple homeland defense sub-departments. Although the integration technologies of RFID systems and mobile devices have been defined and appeared in some NFC specifications. In recently years, combine the technologies of Near Field Communication (NFC) in Mobile devices can improve constraint computation capability and memory usage for Radio Frequency Identifications (RFID) systems. Nevertheless, currently some NFC secure key management mechanisms manage these secure multiple secret keys are needed to be very large duplicated storage space using lots of RFID tags, and they still lack the efficiency and flexibility in the management. In this paper, we first propose a multi-issued tag key agreement with time constraint, accompanying a new type of secure tag, called as a secure multi-issued tag, to deal with the problem of the management of multiple secure accesses. To achieve the requirement of near field spatial communications, each secure multi-issued tag can be authorized by distinct missions belonging to distinct group served among homeland defense sub-departments.