Security and Privacy Analysis of RFID Authentication Protocol for Ubiquitous Computing.
Hyun Seok KimJin-Young ChoiPublished in: ICCCN (2007)
Keyphrases
- rfid systems
- ubiquitous computing
- authentication protocol
- rfid technology
- rfid tags
- mutual authentication
- radio frequency identification
- context aware
- ambient intelligence
- smart card
- security analysis
- lightweight
- context awareness
- security issues
- statistical databases
- supply chain
- security mechanisms
- secret key
- public key
- security protocols
- resource constrained
- ubiquitous computing environments
- human activities
- security services
- trusted third party
- information systems
- everyday objects