A tree-based authentication scheme for a cloud toll/traffic RFID system.
Amerah AlabrahMostafa A. BassiouniPublished in: VNC (2015)
Keyphrases
- authentication scheme
- mutual authentication
- traffic data
- transportation networks
- smart card
- secret key
- user authentication
- rfid tags
- network traffic
- authentication protocol
- cloud computing
- public key
- traffic flow
- security flaws
- travel time
- road network
- image authentication
- rfid systems
- low cost
- security analysis
- radio frequency identification
- rfid technology
- traffic safety
- traffic management
- real time
- network security
- data mining