RFID authentication protocol design methodology.
QingLing CaiYiJu ZhanJian YangPublished in: Int. J. Embed. Syst. (2015)
Keyphrases
- design methodology
- authentication protocol
- rfid tags
- rfid systems
- mutual authentication
- radio frequency identification
- low cost
- lightweight
- rfid technology
- smart card
- public key
- security analysis
- design process
- fuzzy neural network
- security issues
- secret key
- power consumption
- cost effective
- formal specification
- security mechanisms
- security protocols
- object oriented
- database
- hash functions
- supply chain
- case study
- databases