Back to Results
First PageMeta Content
Wireless / Telecommunications engineering / Automatic identification and data capture / Privacy / Radio-frequency identification / Challenge-response authentication / Distance-bounding protocol / Man-in-the-middle attack / Communications protocol / Information / Data / Cryptographic protocols


Preparation of Papers for the First EURASIP Workshop on RFID Technology
Add to Reading List

Document Date: 2009-04-03 09:44:44


Open Document

File Size: 107,43 KB

Share Result on Facebook

City

Timing / /

Company

Ad Hoc Networks / IEEE Journal / Bounding Protocols Yu-Ju Tu Information Systems / Piramuthu Information Systems / /

/

Facility

Operations Management University of Florida / /

IndustryTerm

proposed protocol / proposed modified protocol / tag/reader authentication protocols / Wireless Sensor / authentication protocols / Wireless Networks / similar published protocols / /

Organization

University of Florida / /

ProgrammingLanguage

FL / /

PublishedMedium

Lecture Notes in Computer Science / /

SportsEvent

ufl / /

Technology

similar published protocols / existing RFID tag/reader authentication protocols / secret key / proposed algorithm / Timing-Based Protocols / proposed modified protocol / authentication protocols / proposed protocol / /

SocialTag