Novel RFID Authentication Schemes for Security Enhancement and System Efficiency.
Nai-Wei LoKuo-Hui YehPublished in: Secure Data Management (2007)
Keyphrases
- key agreement
- mutual authentication
- rfid tags
- security requirements
- security analysis
- identity authentication
- authentication protocol
- rfid technology
- rfid systems
- security mechanisms
- security properties
- radio frequency identification
- data encryption
- graphical password
- access control
- radio frequency identification rfid
- fuzzy vault
- authentication systems
- low cost
- encryption decryption
- identity management
- authentication mechanism
- security level
- security problems
- smart card
- user authentication
- security services
- high security
- authentication scheme
- statistical databases
- elliptic curve
- virtual private network
- security protocols
- public key
- security issues
- wireless local area network
- public key encryption
- identity based cryptography
- factor authentication
- private key
- integrity verification
- wireless sensor networks
- security systems
- data security
- privacy protection
- supply chain