Login / Signup
Mutual authentication-based RA scheme for embedded systems.
Ziwang Wang
Yi Zhuang
Qingxun Xia
Published in:
IET Inf. Secur. (2020)
Keyphrases
</>
embedded systems
mutual authentication
security analysis
low cost
authentication scheme
authentication mechanism
authentication protocol
rfid tags
privacy protection
smart card
private key
relational databases
resource constrained
rfid systems
software systems
trusted third party