Random Graph Based Benchmarking Methodology for RFID Security Protocols.
Shan ChangHui SongLi LuQingsong YaoYong QiPublished in: ICEBE (2013)
Keyphrases
- security protocols
- rfid tags
- rfid systems
- automated design
- security properties
- low cost
- cryptographic algorithms
- secure communication
- security services
- artificial immune algorithm
- key management
- authentication protocol
- data mining
- supply chain
- cryptographic protocols
- security mechanisms
- security requirements
- cost effective