The Community for Technology Leaders
Green Image
Issue No. 02 - March/April (2011 vol. 13)
ISSN: 1520-9202
pp: 20-24
Chia-Hui Wei , Comput. Sci., Nat. Tsing Hua Univ., Hsinchu, Taiwan
Min-Shiang Hwang , Dept. of Comput. Sci. & Inf. Eng., Asia Univ., Taichung, Taiwan
A Y Chin , Dept. of Comput. Sci., Nat. Tsing Hua Univ., Hsinchu, Taiwan
Designing a security protocol for RFID systems is difficult because RFID tags have limited power-consumption and memory capabilities. A mutual authentication protocol based on a hash function helps prevent attacks against RFID systems.
telecommunication security, cryptographic protocols, radiofrequency identification, encryption methods, authentication protocol, security protocol, RFID systems, RFID tags, power-consumption, Databases, Radiofrequency identification, Protocols, Authentication, Privacy, Network security, information technology, Hash function, privacy, RFID, and security

Min-Shiang Hwang, Chia-Hui Wei and A. Y. Chin, "A Mutual Authentication Protocol for RFID," in IT Professional, vol. 13, no. , pp. 20-24, 2011.
93 ms
(Ver 3.3 (11022016))