Time cost evaluation for executing RFID authentication protocols
There are various reader/tag authentication protocols proposed for the security of RFID systems. Such a protocol normally contains several rounds of conversations between a tag and a reader and involves cryptographic operations at both reader and tag sides. Currently there is a lack of benchmarks th...
Saved in:
Main Authors: | CHIEW, Kevin, LI, Yingjiu, LI, Tieyan, DENG, Robert H., AIGNER, Manfred |
---|---|
Format: | text |
Language: | English |
Published: |
Institutional Knowledge at Singapore Management University
2010
|
Subjects: | |
Online Access: | https://ink.library.smu.edu.sg/sis_research/639 https://ink.library.smu.edu.sg/context/sis_research/article/1638/viewcontent/Time_cost_evaluation_RFID_IoT_2010_afv.pdf |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Singapore Management University |
Language: | English |
Similar Items
-
Attacks and Improvements to an RFID Mutual Authentication Protocol
by: CAI, Shaoying, et al.
Published: (2009) -
On the Untraceability of Anonymous RFID Authentication Protocol with Constant Key-Lookup
by: LIANG, Bing, et al.
Published: (2009) -
The Security and Improvement of An Ultra-Lightweight RFID Authentication Protocol
by: LI, Tieyan, et al.
Published: (2008) -
Security analysis on a family of ultra-lightweight RFID authentication protocols
by: LI, Tieyan, et al.
Published: (2008) -
Scalable RFID Authentication and Discovery in Epcglobal Network
by: LI, Tieyan, et al.
Published: (2008)