Login / Signup
An efficient and secure RFID authentication protocol using elliptic curve cryptography.
Negin Dinarvand
Hamid Barati
Published in:
Wirel. Networks (2019)
Keyphrases
</>
authentication protocol
elliptic curve cryptography
authentication scheme
security analysis
public key
mutual authentication
rfid tags
rfid systems
smart card
user authentication
radio frequency identification
lightweight
public key cryptography
low cost
high security
security model
private key
secret key
cryptographic protocols
security protocols
digital signature
security requirements
encryption scheme
key distribution
rfid technology
diffie hellman
signature scheme
resource constrained
security mechanisms
key exchange
security issues
provably secure
information systems
secure communication
security properties
encryption algorithm
elliptic curve