A Security Mechanism For RFID With Dependable Proxy.
Jun ZhouYongjun XuXiaowei LiPublished in: Intell. Autom. Soft Comput. (2011)
Keyphrases
- security mechanisms
- rfid tags
- rfid systems
- resource constrained
- radio frequency identification
- security issues
- low cost
- security problems
- rfid technology
- security systems
- access control
- digital signature
- smart card
- security protocols
- operating system
- lightweight
- security requirements
- supply chain
- power consumption
- trusted third party
- authentication protocol
- low power consumption
- cost effective
- computer systems
- resource constraints
- supply chain management
- anomaly detection
- data processing
- database systems
- security measures
- data sets
- real time