Login / Signup
Consideration on the brute-force attack cost and retrieval cost: A hash-based radio-frequency identification (RFID) tag mutual authentication protocol.
Jung-Sik Cho
Young-Sik Jeong
Sang Oh Park
Published in:
Comput. Math. Appl. (2015)
Keyphrases
</>
rfid tags
authentication protocol
radio frequency identification
rfid systems
brute force
lightweight
low cost
cost effective
rfid technology
rfid reader
resource constrained
smart card
secret key
security protocols
public key
security issues
software architecture
mutual authentication