Login / Signup
A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems.
Lijun Gao
Maode Ma
Yantai Shu
Yuhua Wei
Published in:
Wirel. Pers. Commun. (2013)
Keyphrases
</>
security protocols
rfid systems
cryptographic algorithms
security mechanisms
rfid tags
authentication protocol
security problems
key management
security requirements
low cost
wireless sensor networks
context aware
resource constrained