Keyphrases
- security protocols
- rfid tags
- cryptographic protocols
- anti collision
- rfid systems
- security flaws
- countermeasures
- authentication protocol
- mutual authentication
- low cost
- radio frequency identification
- security mechanisms
- supply chain
- data collection
- security properties
- radio frequency identification rfid
- watermarking scheme
- traffic analysis
- rfid reader
- malicious users
- rfid technology
- cost effective
- watermarking algorithm
- cyber attacks
- security risks
- information systems
- terrorist attacks
- malicious attacks
- security threats
- security problems
- application level
- key management