Secure Improved Cloud-Based RFID Authentication Protocol.
Sarah AbughazalahKonstantinos MarkantonakisKeith MayesPublished in: DPM/SETOP/QASA (2014)
Keyphrases
- authentication protocol
- rfid tags
- rfid systems
- mutual authentication
- security analysis
- smart card
- radio frequency identification
- lightweight
- password authentication
- security protocols
- authentication scheme
- public key
- key distribution
- low cost
- user authentication
- rfid technology
- secret key
- cryptographic protocols
- cloud computing
- authentication mechanism
- security issues
- cost effective
- hash functions
- trusted third party
- session key
- resource constrained
- database systems
- security requirements
- information security
- data management
- supply chain
- data streams