A survey of RFID authentication protocols based on hash-chain method
Security and privacy are the inherent problems in RFID communications. There are several protocols have been proposed to overcome those problems. Hash chain is commonly employed by the protocols to improve security and privacy for RFID authentication. Although the protocols able to provide specific...
| Main Authors: | , , , |
|---|---|
| Other Authors: | |
| Format: | Conference Paper |
| Published: |
Institute of Electrical and Electronics Engineers (IEEE) Computer Society
2008
|
| Subjects: | |
| Online Access: | http://hdl.handle.net/20.500.11937/8607 |