RFID Authentication Protocol Resistant to the Man-in-the-Middle Attack.
Li ZhaiChuanKun WuPublished in: SecureComm (2) (2014)
Keyphrases
- authentication protocol
- rfid tags
- rfid systems
- mutual authentication
- radio frequency identification
- low cost
- lightweight
- rfid technology
- authentication scheme
- security analysis
- smart card
- public key
- resource constrained
- cost effective
- secret key
- security protocols
- power consumption
- password authentication
- information systems
- supply chain management
- distributed systems
- supply chain
- data analysis