An asymptotically optimal RFID protocol against relay attacks.
Gildas AvoineAslan TchamkertenPublished in: IACR Cryptol. ePrint Arch. (2008)
Keyphrases
- asymptotically optimal
- security protocols
- rfid systems
- cryptographic protocols
- rfid tags
- mutual authentication
- asymptotic optimality
- arrival rate
- heavy traffic
- rfid technology
- authentication protocol
- security analysis
- security mechanisms
- lightweight
- call center
- optimal policy
- electronic commerce
- ddos attacks
- multi dimensional
- supply chain
- state space