Weaknesses in Two Recent Lightweight RFID Authentication Protocols.
Pedro Peris-LopezJulio C. Hernandez-CastroJuan E. TapiadorTieyan LiJan C. A. van der LubbePublished in: Inscrypt (2009)
Keyphrases
- lightweight
- authentication protocol
- rfid tags
- rfid systems
- radio frequency identification
- rfid technology
- low cost
- resource constrained
- wireless sensor networks
- cryptographic protocols
- public key
- data collection
- security protocols
- e government
- communication infrastructure
- security mechanisms
- security analysis
- security issues
- similarity measure