Keyphrases
- data encryption
- radio frequency identification rfid
- rfid technology
- rfid systems
- rfid tags
- radio frequency identification
- authentication mechanism
- mutual authentication
- authentication protocol
- security mechanisms
- security requirements
- identity authentication
- security analysis
- user authentication
- trusted platform module
- supply chain
- authentication scheme
- access control
- integrity verification
- security problems
- encryption decryption
- security issues
- factor authentication
- key technologies
- rfid middleware
- life cycle
- low cost
- virtual private network
- fuzzy vault
- elliptic curve cryptography
- key management
- smart card
- information security
- ubiquitous computing
- key distribution
- supply chain management
- trust negotiation
- lightweight
- security services
- key agreement
- network security
- resource constrained