Keyphrases
- authentication protocol
- smart card
- security analysis
- lightweight
- password authentication
- security protocols
- authentication scheme
- user authentication
- rfid tags
- public key
- cryptographic protocols
- rfid systems
- key distribution
- mutual authentication
- key technologies
- secret key
- hash functions
- peer to peer
- end to end
- trusted third party
- session key
- authentication mechanism
- security requirements
- ubiquitous computing
- low cost