Login / Signup
Looking for needles in a haystack: Detecting counterfeits in large scale RFID systems using batch authentication protocol.
Farzana Rahman
Sheikh Iqbal Ahamed
Published in:
PerCom Workshops (2012)
Keyphrases
</>
rfid systems
authentication protocol
rfid tags
smart card
radio frequency identification
security analysis
security protocols
lightweight
secret key
rfid technology
security problems
public key
hash functions