Rank-metric code-based mutual authentication protocol for RFID.
Edoukou Berenger AyebieEl Mamoun SouidiPublished in: J. Inf. Secur. Appl. (2020)
Keyphrases
- authentication protocol
- rfid tags
- rfid systems
- mutual authentication
- radio frequency identification
- lightweight
- low cost
- smart card
- rfid technology
- security analysis
- public key
- source code
- resource constrained
- cost effective
- authentication scheme
- security issues
- security protocols
- password authentication
- hash functions
- power consumption
- security mechanisms
- software systems
- supply chain
- nearest neighbor