DPM'11 Proceedings of the 6th international conference, and 4th international conference on Data Privacy Management and Autonomous Spontaneus Security
On the security of RFID anti-counting security protocol (ACSP)
Journal of Computational and Applied Mathematics
Hi-index | 0.00 |
Designing a security protocol for RFID systems is difficult because RFID tags have limited power-consumption and memory capabilities. A mutual authentication protocol based on a hash function helps prevent attacks against RFID systems.