Time cost evaluation for executing RFID authentication protocols
There are various reader/tag authentication protocols proposed for the security of RFID systems. Such a protocol normally contains several rounds of conversations between a tag and a reader and involves cryptographic operations at both reader and tag sides. Currently there is a lack of benchmarks th...
Saved in:
Main Authors: | , , , , |
---|---|
格式: | text |
語言: | English |
出版: |
Institutional Knowledge at Singapore Management University
2010
|
主題: | |
在線閱讀: | https://ink.library.smu.edu.sg/sis_research/639 https://ink.library.smu.edu.sg/context/sis_research/article/1638/viewcontent/Time_cost_evaluation_RFID_IoT_2010_afv.pdf |
標簽: |
添加標簽
沒有標簽, 成為第一個標記此記錄!
|
機構: | Singapore Management University |
語言: | English |