Login / Signup
A Secure RFID Application Revocation Scheme for IoT.
Kai Fan
Zhao Du
Yuanyuan Gong
Yue Wang
Tongjiang Yan
Hui Li
Yintang Yang
Published in:
IEICE Trans. Inf. Syst. (2016)
Keyphrases
</>
key distribution
key management
rfid systems
rfid tags
low cost
key exchange
supply chain
power consumption
security requirements
diffie hellman
trusted third party