Login / Signup
New ECC-Based IoT Authentication Protocol for Securing RFID Systems.
Hind Timouhin
Fatima Amounas
Mourade Azrour
Published in:
SN Comput. Sci. (2023)
Keyphrases
</>
rfid systems
authentication protocol
security analysis
smart card
public key
information security
security requirements
rfid tags
lightweight
security protocols
error correction
encryption scheme
rfid technology
supply chain
conflict resolution
secret key
computer networks
elliptic curve
cloud computing