Login / Signup
Security enhancement of the authenticated RFID security mechanism based on chaotic maps.
Mustapha Benssalah
Mustapha Djeddou
Karim Drouiche
Published in:
Secur. Commun. Networks (2014)
Keyphrases
</>
security mechanisms
rfid tags
chaotic maps
image encryption
authentication scheme
rfid systems
smart card
security problems
security issues
security systems
security requirements
resource constrained
authentication protocol
access control
security protocols
security measures
radio frequency identification
image encryption scheme
low cost
operating system
security analysis
digital signature
image encryption algorithm
rfid technology
secret key
lightweight
public key
chaotic sequence
encryption algorithm
user authentication
database systems
sensor networks
information security