Login / Signup
Practical attacks on a mutual authentication scheme under the EPC Class-1 Generation-2 standard.
Pedro Peris-Lopez
Tieyan Li
Julio C. Hernandez-Castro
Juan E. Tapiador
Published in:
Comput. Commun. (2009)
Keyphrases
</>
authentication scheme
security flaws
smart card
supply chain
image encryption
image authentication
user authentication
public key
password guessing
secret key
web services
real time
watermarking scheme
peer to peer
low cost
elliptic curve cryptography
data mining