Issue 1, June 2013

51 - 57Design and Implementation of an Encryption Algorithm for use in RFID System

DOI: 10.20533/ijrfidsc.2046.3715.2013.0007
M. B. Abdelhalim, M. El-Mahallawy, M. Ayyad A. Elhennawy Download Paper
58 - 66PUMAP: A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol

DOI: 10.20533/ijrfidsc.2046.3715.2013.0008
Ramzi Bassil, Wissam El-Beaino,Wassim Itani, Ayman Kayssi, Ali Chehab Download Paper
67 - 73Comparative Study of Elliptic Curve Cryptography Hardware Implementations in Wireless Sensor Networks

DOI: 10.20533/ijrfidsc.2046.3715.2013.0009
Hilal Houssain, Mohamad Badra, Turki F. Al-Somani Download Paper

Issue 2, December 2013

74 - 81Efficient Approach for Redundant Reader Elimination for Directional Antenna in RFID Networks

DOI: 10.20533/ijrfidsc.2046.3715.2013.0010
Nazish Irfan, Mustapha C. E.Yagoub, Khelifa Hettak Download Paper
82 - 91Warbler: A Lightweight Pseudorandom Number Generator for EPC C1 Gen2 Passive RFID Tags

DOI: 10.20533/ijrfidsc.2046.3715.2013.0011
Kalikinkar Mandal, Xinxin Fan, Guang Gong Download Paper
92 - 106A Practical Generic Relay Attack on Contactless Transactions by Using NFC Mobile Phones

DOI: 10.20533/ijrfidsc.2046.3715.2013.0012
Lishoy Francis, Gerhard Hancke, Keith Mayes Download Paper