Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking.
Kaleb LeeColin BoydJuan Manuel González NietoPublished in: ACISP (2012)
Keyphrases
- authentication protocol
- rfid tags
- information leakage
- rfid systems
- radio frequency identification
- lightweight
- low cost
- personal information
- smart card
- rfid technology
- security analysis
- secret information
- public key
- supply chain
- authentication scheme
- security protocols
- power consumption
- security requirements
- security issues
- cost effective
- index structure
- data sets