RFID authentication protocols based on ECC encryption schemes.
Mustapha BenssalahMustapha DjeddouKarim DrouichePublished in: RFID-TA (2012)
Keyphrases
- encryption scheme
- authentication protocol
- security analysis
- rfid systems
- public key
- rfid tags
- standard model
- secret key
- user authentication
- authentication scheme
- security model
- secret sharing scheme
- rfid technology
- data sharing
- radio frequency identification
- hash functions
- key distribution
- diffie hellman
- low cost
- ciphertext
- private key
- cryptographic protocols
- image encryption
- lossless compression
- secure communication
- digital signature
- lightweight
- smart card
- image quality
- data warehouse