Scalability and Security Conflict for RFID Authentication Protocols.
Imran ErgulerEmin AnarimPublished in: IACR Cryptol. ePrint Arch. (2010)
Keyphrases
- authentication protocol
- rfid tags
- rfid systems
- mutual authentication
- security analysis
- radio frequency identification
- rfid technology
- smart card
- radio frequency identification rfid
- low cost
- lightweight
- ban logic
- security problems
- public key
- security issues
- security protocols
- key distribution
- conflict resolution
- cryptographic protocols
- security mechanisms
- cost effective
- security requirements
- formal analysis
- resource constrained
- session key
- hash functions
- ubiquitous computing
- supply chain