Two mutual authentication protocols based on zero-knowledge proofs for RFID systems
From MaRDI portal
Recommendations
- Secure and efficient RFID mutual authentication protocol
- Weaknesses in two RFID authentication protocols
- A novel mutual authentication scheme based on quadratic residues for RFID systems
- Consideration on the brute-force attack cost and retrieval cost: a hash-based radio-frequency identification (RFID) tag mutual authentication protocol
- Fast privacy preserving RFID authentication protocol
Cited in
(4)
This page was built for publication: Two mutual authentication protocols based on zero-knowledge proofs for RFID systems
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q1642466)