Neural cryptography applied to key management protocol with mutual authentication in RFID systems.
Macedo FirminoGlaucio B. BrandaoAna M. G. GuerreiroRicardo Alexsandro de Medeiros ValentimPublished in: ICITST (2009)
Keyphrases
- rfid systems
- mutual authentication
- security protocols
- key management
- authentication protocol
- rfid tags
- secret key
- key distribution
- security analysis
- authentication scheme
- resource constrained
- digital signature
- private key
- radio frequency identification
- public key
- rfid technology
- low cost
- security problems
- lightweight
- wireless sensor networks
- smart card
- security services
- security requirements
- privacy protection
- cost effective