A Location-Privacy-Protected RFID Authentication Scheme.
Ya-Fen ChangShao-Cian LinPei-Yu ChangPublished in: ICC (2011)
Keyphrases
- location privacy
- authentication scheme
- rfid systems
- authentication protocol
- rfid tags
- smart card
- secret key
- public key
- user authentication
- radio frequency identification
- rfid technology
- sensitive data
- security analysis
- lightweight
- low cost
- security protocols
- security problems
- location based services
- security requirements
- mobile users
- privacy protection
- mobile communication
- power consumption
- privacy preserving
- resource constrained
- data collection