JOURNAL ARTICLE

Efficient group authentication in RFID using secret sharing scheme

Yanxiao LiuQindong SunYichuan WangLei ZhuWenjiang Ji

Year: 2018 Journal:   Cluster Computing Vol: 22 (S4)Pages: 8605-8611   Publisher: Springer Science+Business Media
Keywords:
Computer science Scheme (mathematics) Secret sharing Computer security Group (periodic table) Authentication (law) Computer network Theoretical computer science Cryptography

Metrics

9
Cited By
1.10
FWCI (Field Weighted Citation Impact)
26
Refs
0.81
Citation Normalized Percentile
Is in top 1%
Is in top 10%

Citation History

Topics

RFID technology advancements
Physical Sciences →  Engineering →  Media Technology
Advanced Authentication Protocols Security
Physical Sciences →  Computer Science →  Computer Networks and Communications
User Authentication and Security Systems
Physical Sciences →  Computer Science →  Information Systems

Related Documents

JOURNAL ARTICLE

RFID authentication protocol based on secret-sharing scheme

Chao YangHongqi Zhang

Journal:   Journal of Computer Applications Year: 2013 Vol: 32 (12)Pages: 3458-3461
BOOK-CHAPTER

An Efficient Group-Based Secret Sharing Scheme

Chunli LvXiaoqi JiaJingqiang LinJiwu JingLijun Tian

Lecture notes in computer science Year: 2011 Pages: 288-301
BOOK-CHAPTER

An Efficient Threshold Multi-group-Secret Sharing Scheme

Huixian LiLiaojun PangWandong Cai

Advances in soft computing Year: 2007 Pages: 911-918
© 2026 ScienceGate Book Chapters — All rights reserved.