Secure and Efficient RFID Authentication for Social Network in Cloud
Abstract
Keywords
Full Text:
PDFReferences
Guomin Yang,Qiong Huang,Duncan Yang, “Universal authentication protocol for wireless communications,” IEEE Trans. Wireless Communications, vol. 9, pp. 168–174, Jan 2010.
C.Tang, “An efficient mobile authentication scheme for wireless networks,” IEEE Trans. Wireless Communications, vol. 7, pp. 1408–1416, April 2008.
W.Granzer,F.Praus,W.Kastner, “Security in building automation systems,” IEEE Trans. Industrial Electronics, vol. 57,no.11, pp. 622–630, Nov. 2010.
Chun-I Fan,Pei-Hsiu, “Provably secure nested one time secret mechanisms for fast mutual authentication and key exchange in mobile communications,” IEEE Trans. Networking, vol. 18,no.3, pp. 996–1009, June. 2010.
Chu-Hsing Lin,Yi-Yi Lai. (2004, Nov). Title. Journal Computer Standards & Interfaces Volume 27, issue 1, pp.19-23 Available: http://www.elsevier.com/locate/csi
P.Corcoran,C.Iancu,F.Callaly, “Biometric access control for digital media streams in home networks,” IEEE Trans. Consumer Electronics, vol. 53,no.3, pp. 917–925, August. 2007.
P.Corcoran,A.Cucos,T.Grossman, “Biometrically auditable public key infrastructure technology for secure multimedia content,” in Conf. Rec. 2005 IEEE Int. Conf. Consumer Electronics, pp. 33–34.
P.Corcoran,A.Cucos, “Techniques for securing multimedia content in consumer electronic appliances using biometric signatures,” IEEE Trans. Consumer Electronics, vol. 51,no.2, pp. 545–551, May. 2005.
Li Xiong,Ling Liu, “Peer Trust: Supporting reputation based trust for peer to peer electronic communities,” IEEE Trans. Knowledge and Data Engineering, vol. 16,no.7, pp. 843–857, July. 2004.
Binod Vaidya,Jong Hyuk Park,Sang Soo Yeo,Joel J.P.C.Rodrigues. (2010, March). Title. Journal Computer Communication Volume 34, pp.326-336 Available: http://www.elsevier.com/locate/comcom
Slawomir Grzonkowski,Peter M. Corcoran, “Sharing cloud services:User authentication for social enhancement of home networking,” IEEE Trans. Consumer Electronics, vol. 57,no.3, pp. 917–925, August. 2011.
S.Grzonkowski,A.Gazella,A.Kruk,S.R.Breslin,J.G.Woroneiki,Dobrzanski.J, “Sharing information across community portals with FOAF Realm,” Int. J. Web Based Communities, vol. 5,no.3, pp. 351–370, 2009.
S.R.Krusk,S.Grzonkowski,A.Gazella,T.Woroneki,H.C.Choi,“D-FOAF:Distributed identity management with acess right delegation,” in Proc. 4th Asian Semantic Web Conf. , 2006, pp. 1–6.
R.Chow,M.Jakobson, “Authentication in clouds:A framework and its applications to mobile users”, in Proc. ACM Workshop. Cloud Computing Security, New York, 2010, pp. 8–16.
Kyle Chard, “Social Cloud:Cloud Computing in Social Networks,” in Conf. Rec. 2011, IEEE Int. Conf. Web Services, pp. 3–8.
Muhammed Ali Bing, “Anonymous RFID authentication for cloud services,” Int. J. Information Security Science, vol. 1,no.2, pp. 32–40, 2011.
A.Juels, “RFID Security and Privacy,” IEEE. J. Selected Areas in Communications, vol. 24,issue.2, pp. 381–394, 2006.
J.Ha,S.Moon,J.Zhou, “A new formal proof model for RFID location privacy,” presented at the 2008 European Symposium.Research in Computer Society, Vol.5283.
Abdul Raouf Khan. (2012, May). Title. ARPN Journal Engineering and Applied Sciences Volume 7,no.5 pp.613-614 Available:http://www.arpnjournals.com.
Hani Ragab Hassan,Hatem Bettahar,Abdalmadjid Boudbdallah,Yacine Challal. (2012, March). Title. Journal Computer Networks Volume 56, pp.2107-2118 Available: http://www.elsevier.com/locate/comnet.
Eugenia I.Papagiannakopoulou, “A Privacy Aware Access Control Model for Distributed Network Monitoring,” unpublished
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.