Login / Signup
Security flaws in a recent RFID delegation protocol.
Imran Erguler
Emin Anarim
Published in:
Pers. Ubiquitous Comput. (2012)
Keyphrases
</>
security flaws
authentication scheme
mutual authentication
rfid systems
low cost
web services
lightweight
security analysis
supply chain
data collection
access control
conflict resolution
rfid reader
authentication protocol
cryptographic protocols
adjustable autonomy