Construction of the Enterprise-level RFID Security and Privacy Management Using Role-Based Key Management.
Chun-Te ChenKun-Lin LeeYing-Chieh WuKun-De LinPublished in: SMC (2006)
Keyphrases
- key management
- security services
- rfid technology
- rfid systems
- security threats
- security protocols
- wireless sensor networks
- radio frequency identification rfid
- resource constrained
- key management scheme
- ad hoc networks
- identity based cryptography
- key distribution
- secret key
- mutual authentication
- security issues
- rfid tags
- security mechanisms
- digital signature
- information systems
- security management
- provably secure
- security properties
- low cost
- access control
- elliptic curve
- secure communication
- data collection
- privacy preserving
- personal information
- network management
- signcryption scheme
- key establishment
- advanced metering infrastructure
- role based access control
- data security
- statistical databases
- routing protocol