Vulnerabilities in Chen and Deng's RFID mutual authentication and privacy protection protocol.
Gaurav KapoorSelwyn PiramuthuPublished in: Eng. Appl. Artif. Intell. (2011)
Keyphrases
- mutual authentication
- privacy protection
- privacy preserving
- data sharing
- information loss
- statistical databases
- data collection
- security analysis
- rfid tags
- trusted third party
- information security
- sensitive data
- private information
- security mechanisms
- sensitive information
- authentication protocol
- database
- security issues
- rfid systems
- data warehouse