A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol.
Yi-Pin LiaoChih-Ming HsiaoPublished in: Ad Hoc Networks (2014)
Keyphrases
- mutual authentication
- authentication scheme
- elliptic curve cryptography
- security analysis
- authentication protocol
- user authentication
- smart card
- secret key
- image encryption
- public key
- rfid tags
- key agreement
- security model
- rfid systems
- security requirements
- security flaws
- lightweight
- private key
- image authentication
- high security
- low cost
- security properties
- digital signature
- encryption scheme
- error correction