Login / Signup
On the use of one-way chain based authentication protocols in secure control systems.
Bogdan Groza
Toma-Leonida Dragomir
Published in:
ARES (2007)
Keyphrases
</>
authentication protocol
control system
smart card
security analysis
security protocols
cryptographic protocols
user authentication
lightweight
public key
key distribution
secret key
rfid tags
session key
ban logic
real time
rfid systems
hash functions
computer systems
security properties