|
Volumn 34, Issue 3, 2011, Pages 250-256
|
The design of RFID access control protocol using the strategy of indefinite-index and challenge-response
|
Author keywords
Access control; Authentication; Authorization; RFID; Security
|
Indexed keywords
ACCESS CONTROL PROTOCOL;
ACCESS CONTROL SCHEMES;
ACCESS RIGHTS;
AUTHENTICATION MECHANISMS;
AUTHORIZATION;
CHALLENGE RESPONSE;
LOCATION PRIVACY;
MAN IN THE MIDDLE ATTACKS;
MUTUAL AUTHENTICATION;
RFID;
RFID SYSTEMS;
SECURITY;
RADIO FREQUENCY IDENTIFICATION (RFID);
SECURITY OF DATA;
SECURITY SYSTEMS;
AUTHENTICATION;
|
EID: 78751647681
PISSN: 01403664
EISSN: None
Source Type: Journal
DOI: 10.1016/j.comcom.2010.05.012 Document Type: Article |
Times cited : (25)
|
References (8)
|