Secure Access Control Schemes for RFID Systems with Anonymity
暂无分享,去创建一个
This paper points out the weaknesses of Weis et al. 's authentication schemes for Radio Frequency IdentiJication (RFID) systems, and proposes two lightweight schemes. Compared to the previous schemes, the new schemes have better performance in security, anonymity, sewer's maintenance, and scalability.
[1] Chang-Seop Park,et al. Authentication protocol providing user anonymity and untraceability in wireless mobile communication systems , 2004, Comput. Networks.
[2] Thomas M. Cover,et al. Enumerative source encoding , 1973, IEEE Trans. Inf. Theory.
[3] Jennifer Seberry,et al. Error-correcting codes for authentication and subliminal channels , 1991, IEEE Trans. Inf. Theory.
[4] Ronald L. Rivest,et al. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems , 2003, SPC.