DOI:10.20894/IJCNES.
Periodicity: Bi Annual.
Impact Factor:
SJIF:5.217
Submission:Any Time
Publisher:IIR Groups
Language:English
Review Process:
Double Blinded

News and Updates

Author can submit their paper through online submission. Click here

Paper Submission -> Blind Peer Review Process -> Acceptance -> Publication.

On an average time is 3 to 5 days from submission to first decision of manuscripts.

Double blind review and Plagiarism report ensure the originality

IJCNES provides online manuscript tracking system.

Every issue of Journal of IJCNES is available online from volume 1 issue 1 to the latest published issue with month and year.

Paper Submission:
Any Time
Review process:
One to Two week
Journal Publication:
June / December

IJCNES special issue invites the papers from the NATIONAL CONFERENCE, INTERNATIONAL CONFERENCE, SEMINAR conducted by colleges, university, etc. The Group of paper will accept with some concession and will publish in IJCNES website. For complete procedure, contact us at admin@iirgroups.org

Paper Template
Copyright Form
Subscription Form
web counter
web counter
Published in:   Vol. 4 Issue 1 Date of Publication:   June 2015

Minimalist Cryptography for RFID Authentication Protocol against Compromised Tag Attack

E.Lavanya,C. Palanisamy, T.Parameswaran

Page(s):   1-4 ISSN:   2278-2397
DOI:   10.20894/IJCNES.103.004.001.001 Publisher:   Integrated Intelligent Research (IIR)


  1. Batina L, Lee Y, Seys S, et al,   "Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs",   Personal and Ubiquitous Computing
    View Artical

  2. Gul N. Khan, Jack Yu and Fei Yuan,   "XTEA based Secure Authentication Protocol for RFID Systems. Ryerson University",   ICCCN Workshops   ,2011
    View Artical

  3. Peris-Lopez P, Orfila A, Hernandez-Castro J, et al,   "Flaws on RFID grouping-proofs",   Journal of Network and Computer Applications   ,2011
    View Artical

  4. Eslam Gamal Ahmed,   "Lightweight Mutual Authentication Protocol for Low Cost RFID Tags",   International Journal of Network Security & Its Ap   ,Vol.2   ,2010
    View Artical

  5. Ma C, Lin J, Wang Y, et al,   "Offline RFID grouping proofs with trusted timestamps",   Proceedings of the 11th IEEE International Confere   ,2012
    View Artical

  6. Sato Y, Mitsugi J, Nakamura O, et al,   "Theory and performance evaluation of group coding of RFID tags",   IEEE Transactions on Automation Science and Engine   ,2012
    View Artical

  7. Yang M H,   "Secure multiple group ownership transfer protocol for mobile RFID",   Electronic Commerce Research and Applications   ,2012
    View Artical

  8. Yang M H, Hu H Y,   "Protocol for ownership transfer across authorities:with the ability to assign transfer target",   Journal of Security and Communication Networks   ,2012
    View Artical

  9. Samad Rostampour, Mojtaba Eslamnezhad Namin, Mehdi Hosseinzadeh,   "A Novel Mutual RFID Authentication Protocol with Low Complexity and High Security",   I.J. Modern Education and Computer Science   ,2014
    View Artical

  10. Evangelos Rekleitis, Panagiotis Rizomiliotis, and Stefanos Gritzalis,   "A holistic approach to RFID security and privacy",   University of the Aegean   ,2008
    View Artical

  11. Yalin Chen, Jue-Sam Chou, Chi-Fong Lin, Cheng-Lun Wu,   "A Novel RFID Authentication Protocol based on Elliptic Curve Cryptosystem",   National Tsing Hua University   ,Vol.31   ,2009
    View Artical

  12. Jian Shen, Haowen Tan, Yang Wang, Sai Ji, Jin Wang,   "A Novel RFID Authentication Protocol for Multiple Readers and Tag Groups",   Advanced Science and Technology   ,2014
    View Artical

  13. Ari Juels,   "Minimalist Cryptography for Low-Cost RFID Tags",   RSA Laboratory, USA   ,2008
    View Artical

  14. Canard, S., Coisel, I., Etrog, J., Girault, M.,   "Privacy-preserving RFID systems: Model and constructions",   IACR Cryptology ePrint Archive   ,Vol.13   ,2010
    View Artical

  15. Batina, L., Seys, S., Singel_ee, D., Verbauwhede, I.,   "Hierarchical eccbased RFID authentication protocol",   In: In Proc. of CRYPTO?05, IACR   ,2011
    View Artical

  16. Yi-Pin Liao, Chih-Ming Hsiao,,   "secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol",   Proc. of the 19th International Conference on Adva   ,Vol.18   ,2014
    View Artical

  17. Yong Ki Lee, Lejla Batina, Ingrid Verbauwhede,   "EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol",   IEEE International Conference on RFID   ,2008
    View Artical

  18. A. Miyaji, M. S. Rahman, and M. Soshi.,   "Efficient and Low-Cost RFID Authentication Schemes",   Journal of Wireless Mobile Networks Ubiquitous Com   ,Vol.2
    View Artical

  19. Batina L, Lee Y, Seys S, et al,   "Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs",   Personal and Ubiquitous Computing
    View Artical

  20. Peris-Lopez P, Orfila A, Hernandez-Castro J, et al,   "Flaws on RFID grouping-proofs",   Journal of Network and Computer Applications   ,2011
    View Artical

  21. Ari Juels,   "Minimalist Cryptography for Low-Cost RFID Tags",   RSA Laboratory, USA   ,2008
    View Artical

  22. Canard, S., Coisel, I., Etrog, J., Girault, M.,   "Privacy-preserving RFID systems: Model and constructions",   IACR Cryptology ePrint Archive   ,Vol.13   ,2010
    View Artical

  23. Yong Ki Lee, Lejla Batina, Ingrid Verbauwhede,   "EC-RAC (ECDLP Based Randomized Access Control): Provably Secure RFID authentication protocol",   IEEE International Conference on RFID   ,2008
    View Artical