Continuous RFID-Enabled Authentication: Privacy Implications.
Stan KurkovskyEwa SytaBernardo CasanoPublished in: IEEE Technol. Soc. Mag. (2011)
Keyphrases
- mutual authentication
- rfid systems
- authentication protocol
- security analysis
- rfid tags
- privacy protection
- identity management
- security mechanisms
- aspects of data mining
- authentication mechanism
- electronic payment
- personal information
- authentication scheme
- supply chain
- trusted third party
- secret key
- security issues
- privacy enhancing
- low cost
- privacy preserving
- radio frequency identification rfid
- sensitive information
- biometric template
- smart card
- private key
- privacy concerns
- privacy preservation
- privacy preserving data mining
- private information
- rfid reader
- access control
- differential privacy
- security requirements
- data mining