|
Volumn 261 CCIS, Issue , 2011, Pages 246-255
|
RFID mutual authentication protocols using key exchange based on hash functions
|
Author keywords
Authentication; Hash; Key Exchange; RFID; XOR
|
Indexed keywords
BACK-END DATABASE;
HASH;
KEY EXCHANGE;
KEY TECHNOLOGIES;
MUTUAL AUTHENTICATION;
NON-CONTACT;
PROCESSING CAPABILITY;
RADIO IDENTIFICATIONS;
RFID COMMUNICATION;
RFID PROTOCOLS;
RFID SYSTEMS;
SECURITY ISSUES;
SECURITY PROBLEMS;
UBIQUITOUS SOCIETY;
XOR;
XOR OPERATION;
AUTHENTICATION;
DISTRIBUTED COMPUTER SYSTEMS;
HASH FUNCTIONS;
INFORMATION TECHNOLOGY;
UBIQUITOUS COMPUTING;
RADIO FREQUENCY IDENTIFICATION (RFID);
|
EID: 83755168979
PISSN: 18650929
EISSN: None
Source Type: Book Series
DOI: 10.1007/978-3-642-27180-9_30 Document Type: Conference Paper |
Times cited : (3)
|
References (10)
|