Login / Signup
A novel approach for re-authentication protocol using personalized information.
Szu-Yu Lin
Te-En Wei
Hahn-Ming Lee
Albert B. Jeng
Chien-Tsung Liu
Published in:
ICMLC (2012)
Keyphrases
</>
authentication protocol
personalized information
information services
smart card
security analysis
user profiles
security protocols
lightweight
public key
hash functions
rfid tags
secret key
traffic information
rfid systems
low cost
anomaly detection