Login / Signup
Vulnerability analysis of two ultra lightweight RFID authentication protocols.
Yousof Farzaneh
Mahdi Azizi
Masoud Hadian Dehkordi
Abdolrasoul Mirghadri
Published in:
Int. Arab J. Inf. Technol. (2015)
Keyphrases
</>
lightweight
authentication protocol
rfid tags
rfid systems
radio frequency identification
rfid technology
security protocols
security issues
resource constrained
public key
cryptographic protocols
real time
supply chain management
secret key
development environments
network security
low cost
data streams