An Efficient Distance Bounding RFID Authentication Protocol: Balancing False-Acceptance Rate and Memory Requirement.
Gildas AvoineAslan TchamkertenPublished in: ISC (2009)
Keyphrases
- memory requirements
- authentication protocol
- rfid tags
- rfid systems
- false acceptance rate
- mutual authentication
- lightweight
- smart card
- rfid technology
- radio frequency identification
- euclidean distance
- low cost
- security analysis
- public key
- computational complexity
- security protocols
- distance measure
- distance function
- equal error rate
- supply chain
- secret key
- signature verification
- resource constrained
- similarity measure
- error rate
- feature selection
- access control
- data mining
- real time