Research on Embedding ECC into RFID Authentication Protocol.
Guicheng ShenBingwu LiuPublished in: TrustCom (2012)
Keyphrases
- authentication protocol
- rfid tags
- security analysis
- rfid systems
- mutual authentication
- public key
- radio frequency identification
- low cost
- smart card
- lightweight
- rfid technology
- user authentication
- authentication scheme
- cost effective
- security requirements
- security issues
- resource constrained
- password authentication
- secret key
- power consumption
- watermarking algorithm
- error correction
- elliptic curve
- digital signature
- anomaly detection
- real time