Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 22
Page No. 6006 - 6012

Two Different Authentication Protocol for RFID Credit Card Security

Authors : Rohit Sharma, Pankaj Singh and Abhishek Singhal

References

Chang, A.Y., D.R. Tsai, C.L. Tsai and Y.J. Lin, 2009. An improved certificate mechanism for transactions using radio frequency identification enabled mobile phone. Proceedings of the 43rd Annual International Carnahan Conference on Security Technology, October 5-8, 2009, IEEE, Zurich, Switzerland, ISBN:978-1-4244-4169-3, pp: 36-40.

Chen, M. and S. Chen, 2015. An efficient anonymous authentication protocol for RFID systems using dynamic tokens. Proceedings of the 2015 IEEE 35th International Conference on Distributed Computing Systems, June 29-July2, 2015, IEEE, Columbus, Ohio, ISBN:978-1-4673-7214-5, pp: 756-757.

Dass, P. and H. Om, 2016. A secure authentication scheme for RFID systems. Procedia Comput. Sci., 78: 100-106.
Direct Link  |  

Fu, J., C. Wu, X. Chen, R. Fan and L. Ping, 2010. Scalable pseudo random RFID private mutual authentication. Proceedings of the 2010 2nd International Conference on Computer Engineering and Technology Vol. 7, April 16-18, 2010, IEEE, Chengdu, China, ISBN:978-1-4244-6349-7, pp: 497-500.

Gui, Y.Q. and J. Zhang, 2013. A new authentication rfid protocol with ownership transfer. Proceedings of the 2013 International Conference on ICT Convergence, October 14-16, 2013, IEEE, Jeju, South Korea, ISBN:978-1-4799-0698-7, pp: 359-364.

Li, J., Y. Wang, B. Jiao and Y. Xu, 2010. An authentication protocol for secure and efficient RFID communication. Proceedings of the 2010 International Conference on Logistics Systems and Intelligent Management Vol. 3, January 9-10, 2010, IEEE, Harbin, China, ISBN:978-1-4244-7330-4, pp: 1648-1651.

Sharma, R. and P.K. Singh, 2015. The simulation and analysis of RC4 and 3DES algorithm for data encryption in RFID credit card. Intl. J. Appl. Eng. Res., 10: 4265-4273.

Sharma, R., A.K. Agarwal and P.K. Singh, 2015. Advancement in RFID security by proposed framework utilizing Random bit generator and sensor network. Intl. J. Adv. Comput. Res., 5: 321-326.
Direct Link  |  

Sharma, R., A.K. Agarwal and P.K. Singh, 2015. Transaction security in RFID credit card by polynomial arithmetic along with euclidean parameters. Intl. J. Eng. Technol., 7: 1194-1199.
Direct Link  |  

Sharma, R., K.A., Anuj and P.K. Singh, 2015. Data security by (Information XOR Image) along with high capacity encryption to overcome steganography. Intl. J. Comput. Intell. Res., 11: 27-36.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved