Time cost evaluation for executing RFID authentication protocols

There are various reader/tag authentication protocols proposed for the security of RFID systems. Such a protocol normally contains several rounds of conversations between a tag and a reader and involves cryptographic operations at both reader and tag sides. Currently there is a lack of benchmarks th...

Full description

Saved in:
Bibliographic Details
Main Authors: CHIEW, Kevin, LI, Yingjiu, LI, Tieyan, DENG, Robert H., AIGNER, Manfred
Format: text
Language:English
Published: Institutional Knowledge at Singapore Management University 2010
Subjects:
Online Access:https://ink.library.smu.edu.sg/sis_research/639
https://ink.library.smu.edu.sg/context/sis_research/article/1638/viewcontent/Time_cost_evaluation_RFID_IoT_2010_afv.pdf
Tags: Add Tag
No Tags, Be the first to tag this record!
Institution: Singapore Management University
Language: English

Similar Items