Volume 2 (2013)
Issue 1, June 2013
Pages | Title | Author(s) | Papers |
51 - 57 | Design and Implementation of an Encryption Algorithm for use in RFID System DOI: 10.20533/ijrfidsc.2046.3715.2013.0007 |
M. B. Abdelhalim, M. El-Mahallawy, M. Ayyad A. Elhennawy | |
58 - 66 | PUMAP: A PUF-Based Ultra-Lightweight Mutual-Authentication RFID Protocol DOI: 10.20533/ijrfidsc.2046.3715.2013.0008 |
Ramzi Bassil, Wissam El-Beaino,Wassim Itani, Ayman Kayssi, Ali Chehab | |
67 - 73 | Comparative Study of Elliptic Curve Cryptography Hardware Implementations in Wireless Sensor Networks DOI: 10.20533/ijrfidsc.2046.3715.2013.0009 |
Hilal Houssain, Mohamad Badra, Turki F. Al-Somani |
Issue 2, December 2013
Pages | Title | Author(s) | Papers |
74 - 81 | Efficient Approach for Redundant Reader Elimination for Directional Antenna in RFID Networks DOI: 10.20533/ijrfidsc.2046.3715.2013.0010 |
Nazish Irfan, Mustapha C. E.Yagoub, Khelifa Hettak | |
82 - 91 | Warbler: A Lightweight Pseudorandom Number Generator for EPC C1 Gen2 Passive RFID Tags DOI: 10.20533/ijrfidsc.2046.3715.2013.0011 |
Kalikinkar Mandal, Xinxin Fan, Guang Gong | |
92 - 106 | A Practical Generic Relay Attack on Contactless Transactions by Using NFC Mobile Phones DOI: 10.20533/ijrfidsc.2046.3715.2013.0012 |
Lishoy Francis, Gerhard Hancke, Keith Mayes |