Vulnerabilities of an ECC-based RFID authentication scheme.
Nan LiYi MuWilly SusiloFuchun GuoVijay VaradharajanPublished in: Secur. Commun. Networks (2015)
Keyphrases
- authentication scheme
- elliptic curve cryptography
- security flaws
- mutual authentication
- rfid tags
- authentication protocol
- smart card
- security analysis
- public key
- secret key
- image encryption
- information security
- radio frequency identification
- security issues
- user authentication
- image authentication
- low cost
- rfid technology
- security mechanisms
- rfid systems
- security requirements
- real time
- error correction
- key management
- high security