Securing RFID Tags: Authentication Protocols with Completeness, Soundness, and Non-Traceability.
Huafei ZhuFeng BaoPublished in: WCNC (2007)
Keyphrases
- rfid tags
- authentication protocol
- low cost
- radio frequency identification
- lightweight
- rfid systems
- security protocols
- cost effective
- power consumption
- security issues
- public key
- resource constrained
- rfid technology
- real time
- software architecture
- key distribution
- mutual authentication
- security mechanisms
- cryptographic protocols
- rfid reader
- secret key
- smart card
- similarity search