Hierarchical ECC-Based RFID Authentication Protocol.
Lejla BatinaStefaan SeysDave SingeléeIngrid VerbauwhedePublished in: RFIDSec (2011)
Keyphrases
- authentication protocol
- rfid tags
- rfid systems
- security analysis
- mutual authentication
- radio frequency identification
- public key
- smart card
- low cost
- rfid technology
- lightweight
- authentication scheme
- security protocols
- secret key
- user authentication
- supply chain
- trusted third party
- real time
- security requirements
- cost effective
- software systems