Login / Signup
Treat 'em like other devices: user authentication of multiple personal RFID tags.
Nitesh Saxena
Md. Borhan Uddin
Jonathan Voris
Published in:
SOUPS (2009)
Keyphrases
</>
rfid tags
user authentication
authentication protocol
low cost
lightweight
rfid reader
radio frequency identification
rfid systems
public key
rfid technology
keystroke dynamics
feature extraction
security analysis
resource constrained
security issues
biometric systems
smart card
intrusion detection