Login / Signup
Privacy-friendly synchronized ultralightweight authentication protocols in the storm.
Gildas Avoine
Xavier Carpent
Benjamin Martin
Published in:
J. Netw. Comput. Appl. (2012)
Keyphrases
</>
authentication protocol
smart card
rfid systems
lightweight
security analysis
public key
security protocols
rfid tags
secret key
cryptographic protocols
anomaly detection
ban logic
data sets
security properties
hash functions
personal information
low cost
software engineering