Tree-Based RFID Authentication Protocols Are Definitively Not Privacy-Friendly.
Gildas AvoineBenjamin MartinTania MartinPublished in: RFIDSec (2010)
Keyphrases
- authentication protocol
- rfid systems
- rfid tags
- mutual authentication
- radio frequency identification
- smart card
- security analysis
- rfid technology
- lightweight
- low cost
- public key
- security issues
- security protocols
- cryptographic protocols
- hash functions
- secret key
- resource constrained
- security problems
- trusted third party
- ban logic
- cost effective
- supply chain
- data mining