Keyphrases
- mutual authentication
- security analysis
- rfid tags
- privacy protection
- authentication protocol
- secret key
- authentication scheme
- trusted third party
- rfid systems
- radio frequency identification
- authentication mechanism
- smart card
- security requirements
- encryption scheme
- user authentication
- lightweight
- security protocols
- private key
- information loss
- low cost
- wireless sensor networks
- key distribution
- resource constrained
- public key
- security issues
- data collection