Login / Signup
Vulnerabilities in Chen and Deng's RFID mutual authentication and privacy protection protocol.
Gaurav Kapoor
Selwyn Piramuthu
Published in:
Eng. Appl. Artif. Intell. (2011)
Keyphrases
</>
mutual authentication
privacy protection
privacy preserving
data sharing
information loss
statistical databases
data collection
security analysis
rfid tags
trusted third party
information security
sensitive data
private information
security mechanisms
sensitive information
authentication protocol
database
security issues
rfid systems
data warehouse