Secure RFID Identification and Authentication with Triggered Hash Chain Variants.
Tong-Lee LimTieyan LiTao GuPublished in: ICPADS (2008)
Keyphrases
- information security
- security requirements
- user authentication
- security issues
- security mechanisms
- security analysis
- smart card
- mutual authentication
- security level
- authentication scheme
- biometric data
- authentication protocol
- rfid tags
- anti collision
- authentication mechanism
- biometric authentication
- factor authentication
- security properties
- radio frequency identification
- data encryption
- identity management
- security services
- radio frequency identification rfid
- low cost
- rfid systems
- key distribution
- secret key
- privacy protection
- data collection
- supply chain
- key agreement
- password authentication
- standard model
- security protocols
- biometric identification
- identity authentication
- public key infrastructure
- wireless networks