Experimental Analysis of an RFID Security Protocol.
Zongwei LuoTerry ChanJenny S. LiEdward C. WongWilliam K. CheungVictor C. NgWilton FokPublished in: ICEBE (2006)
Keyphrases
- security protocols
- rfid tags
- rfid systems
- radio frequency identification
- low cost
- security services
- automated design
- authentication protocol
- rfid technology
- cryptographic algorithms
- lightweight
- artificial immune algorithm
- cost effective
- key management
- resource constrained
- security mechanisms
- security issues
- public key
- power consumption
- supply chain
- real time
- supply chain management
- ubiquitous computing
- end to end
- mobile devices
- digital libraries
- data mining