Radio Frequency Identification (RFID) is a technology which has multidimensional applications to reduce the complexity of today life. Everywhere, like access control, transportation, real-time inventory, asset management and automated payment systems etc., RFID has its enormous use. Recently, this technology is opening its wings in healthcare environments, where potential applications include patient monitoring, object traceability and drug administration systems etc. In this paper, we propose a secure RFID-based protocol for the medical sector. This protocol is based on hash operation with synchronized secret. The protocol is safe against active and passive attacks such as forgery, traceability, replay and de-synchronization attack.
Download full-text PDF |
Source |
---|---|
http://dx.doi.org/10.1007/s10916-014-0153-7 | DOI Listing |
Nature
January 2025
Department of Brain and Cognitive Sciences and McGovern Institute, MIT, Cambridge, MA, USA.
Hippocampal circuits in the brain enable two distinct cognitive functions: the construction of spatial maps for navigation, and the storage of sequential episodic memories. Although there have been advances in modelling spatial representations in the hippocampus, we lack good models of its role in episodic memory. Here we present a neocortical-entorhinal-hippocampal network model that implements a high-capacity general associative memory, spatial memory and episodic memory.
View Article and Find Full Text PDFSci Rep
January 2025
Torrens University Australia, Fortitude Valley, QLD 4006, Leaders Institute, 76 Park Road, Woolloongabba, QLD 4102, Brisbane, Queensland, Australia.
Sensors (Basel)
December 2024
College of Cryptography Engineering, Engineering University of PAP, Xi'an 710086, China.
With the rapid development of the Internet of Things (IoT), the scope of personal data sharing has significantly increased, enhancing convenience in daily life and optimizing resource management. However, this also poses challenges related to data privacy breaches and holdership threats. Typically, blockchain technology and cloud storage provide effective solutions.
View Article and Find Full Text PDFSensors (Basel)
December 2024
School of Information Science and Technology, Guangdong University of Foreign Studies, Guangzhou 510420, China.
The major task of a wireless sensor network (WSN) is data collection. Key predistribution (KP) is to establish pairwise keys for secure communication in a WSN, such that all collected data could be securely sent to a backend database. Most research on KP-like schemes is dedicated to enhancing resiliency against node capture attack (NA) and retaining the link connectivity in the meantime.
View Article and Find Full Text PDFPLoS One
January 2025
Cybersecurity Department, College of Computers, Umm Al-Qura University, Makkah City, Kingdom of Saudi Arabia.
The introduction of quantum computing has transformed the setting of information technology, bringing both unprecedented opportunities and significant challenges. As quantum technologies continue to evolve, addressing their implications for software security has become an essential area of research. This paradigm change provides an unprecedented chance to strengthen software security from the start, presenting a plethora of novel alternatives.
View Article and Find Full Text PDFEnter search terms and have AI summaries delivered each week - change queries or unsubscribe any time!