Cloud-Based RFID Mutual Authentication Protocol without Leaking Location Privacy to the Cloud.
Qingkuan DongJiaqing TongYuan ChenPublished in: Int. J. Distributed Sens. Networks (2015)
Keyphrases
- mutual authentication
- location privacy
- privacy protection
- rfid systems
- cloud computing
- sensitive information
- rfid tags
- radio frequency identification
- privacy preserving
- authentication protocol
- rfid technology
- third party
- information loss
- security problems
- data management
- statistical databases
- low cost
- security analysis
- security issues
- trusted third party
- lightweight
- private information
- data sharing
- credit card
- real time