Login / Signup

Looking for needles in a haystack: Detecting counterfeits in large scale RFID systems using batch authentication protocol.

Farzana RahmanSheikh Iqbal Ahamed
Published in: PerCom Workshops (2012)
Keyphrases
  • rfid systems
  • authentication protocol
  • rfid tags
  • smart card
  • radio frequency identification
  • security analysis
  • security protocols
  • lightweight
  • secret key
  • rfid technology
  • security problems
  • public key
  • hash functions