Keyphrases
- rfid tags
- authentication protocol
- low cost
- radio frequency identification
- rfid systems
- rfid technology
- lightweight
- cost effective
- mutual authentication
- public key
- real time
- security issues
- resource constrained
- security protocols
- embedded systems
- authentication scheme
- password authentication
- security mechanisms
- secret key
- power consumption
- computer systems
- data analysis
- data streams
- trusted third party
- similarity measure
- information systems