Privacy-preserving authentication with low computational overhead for RFID systems.
Fen LiuLei HuLi LuWeijia WangPublished in: SecureComm (2007)
Keyphrases
- privacy preserving
- rfid systems
- authentication protocol
- privacy preserving data mining
- privacy preservation
- vertically partitioned data
- rfid tags
- security mechanisms
- security analysis
- privacy protection
- private information
- sensitive data
- data privacy
- privacy concerns
- sensitive information
- rfid technology
- security protocols
- security problems
- secure multiparty computation
- radio frequency identification
- smart card
- resource constrained
- lightweight
- social networks