Wide-Weak Privacy-Preserving RFID Authentication Protocols.
Yong Ki LeeLejla BatinaDave SingeléeIngrid VerbauwhedePublished in: MOBILIGHT (2010)
Keyphrases
- privacy preserving
- authentication protocol
- rfid tags
- rfid systems
- radio frequency identification
- lightweight
- privacy preserving data mining
- low cost
- smart card
- rfid technology
- vertically partitioned data
- security analysis
- privacy preservation
- public key
- private information
- horizontally partitioned data
- multi party
- secure multiparty computation
- privacy sensitive
- privacy concerns
- data privacy
- privacy protection
- security issues
- security protocols
- cryptographic protocols
- sensitive data
- security mechanisms
- privacy preserving association rule mining
- resource constrained
- differential privacy
- secret key
- sensitive information
- cost effective
- supply chain
- security problems
- data streams
- scalar product
- supply chain management