Login / Signup
Privacy-oriented dependency via deniable SIGMA protocol.
Lukasz Krzywiecki
Kamil Kluczniak
Patryk Koziel
Nisha Panwar
Published in:
Comput. Secur. (2018)
Keyphrases
</>
authentication protocol
smart card
security analysis
mutual authentication
security protocols
lightweight
cryptographic protocols
rfid systems
public key
trusted third party
rfid tags
hash functions
secret key
information systems
low cost
image compression