Anonymous RFID Authentication Using Trusted Computing Technologies.
Kurt DietrichPublished in: RFIDSec (2010)
Keyphrases
- computing technologies
- trusted platform module
- trusted computing
- cloud computing
- computing systems
- computing resources
- digital data
- computer networks
- data collection
- mobile computing
- data center
- distributed computing
- rfid tags
- high performance computing
- computing environments
- data management
- big data
- operating system
- sensor networks