Implementation of a secure RFID protocol.
Subutay Giray BaskirSiddika Berna ÖrsPublished in: SIU (2013)
Keyphrases
- rfid systems
- mutual authentication
- cryptographic protocols
- authentication protocol
- security analysis
- lightweight
- security protocols
- rfid tags
- key distribution
- covert channel
- key exchange protocol
- scalar product
- secure routing
- mobile agent system
- authentication scheme
- privacy protection
- group communication
- key exchange
- provably secure
- data collection
- supply chain
- password authentication
- standard model
- security issues
- sensor networks