Mobile RFID Mutual Authentication Protocol Based on Hash Function.
Wenjin YuYixiang JiangPublished in: CyberC (2017)
Keyphrases
- hash functions
- mutual authentication
- authentication protocol
- secret key
- rfid systems
- authentication scheme
- security analysis
- similarity search
- rfid tags
- encryption scheme
- trusted third party
- privacy protection
- data distribution
- low cost
- key distribution
- databases
- security problems
- radio frequency identification
- public key
- distributed systems
- smart card
- data analysis