Login / Signup
Secure Indefinite-Index RFID Authentication Scheme with Challenge-Response Strategy.
Wen-Chung Kuo
Bae-Ling Chen
Lih-Chyau Wuu
Published in:
Inf. Technol. Control. (2013)
Keyphrases
</>
authentication scheme
mutual authentication
smart card
user authentication
secret key
image encryption
authentication protocol
security analysis
security flaws
public key
rfid tags
image authentication
rfid systems
password guessing
web services
key management
security mechanisms
security requirements
low cost