Login / Signup
Globally verifiable clone-resistant device identity with mutual authentication.
Wael Adi
Bassel Soudan
Published in:
ICECS (2008)
Keyphrases
</>
mutual authentication
rfid tags
security analysis
privacy protection
authentication protocol
authentication mechanism
authentication scheme
rfid systems
secret key
lightweight
low cost
secret sharing
trusted third party
smart card
resource constrained
public key
security requirements