Authentication Revisited: Flaw or Not, the Recursive Authentication Protocol.
Guoqiang LiMizuhito OgawaPublished in: ATVA (2008)
Keyphrases
- authentication protocol
- smart card
- user authentication
- security analysis
- lightweight
- public key
- authentication scheme
- password authentication
- security protocols
- key distribution
- secret key
- rfid tags
- cryptographic protocols
- mutual authentication
- ban logic
- hash functions
- software development
- rfid systems
- session key
- information systems