Article ID | Journal | Published Year | Pages | File Type |
---|---|---|---|---|
6872772 | Future Generation Computer Systems | 2019 | 25 Pages |
Abstract
A security analysis shows that the protocol has excellent privacy properties while offering a robust defense against a broad range of typical attacks. It satisfies common security and the low-cost requirements for RFID tags. It is competitive against existing protocol, scoring favourably in terms of computational cost, storage requirement, and communication overhead.
Related Topics
Physical Sciences and Engineering
Computer Science
Computational Theory and Mathematics
Authors
Y. Liu, M.F. Ezerman, H. Wang,