Login / Signup
Providing Security and Privacy in RFID Systems Using Triggered Hash Chains.
Dirk Henrici
Paul Müller
Published in:
PerCom (2008)
Keyphrases
</>
rfid systems
rfid tags
security problems
rfid technology
authentication protocol
security protocols
radio frequency identification
radio frequency identification rfid
hash functions
mutual authentication
computer networks
lightweight
low cost
security analysis