Login / Signup
Elliptic curve cryptography based authentication protocol for small computational capacity RFID systems.
Gyözö Gódor
Péter Szendi
Sándor Imre
Published in:
Q2SWinet (2010)
Keyphrases
</>
rfid systems
authentication protocol
security analysis
authentication scheme
public key
rfid tags
smart card
rfid technology
security protocols
lightweight
user authentication
radio frequency identification
hash functions
security requirements
secret key
real time
encryption scheme
security problems
data management