作者: Ticyan Li , Guilin Wang
DOI: 10.1007/978-0-387-72367-9_10
关键词: Computer science 、 Challenge–response authentication 、 Challenge-Handshake Authentication Protocol 、 Lightweight Extensible Authentication Protocol 、 Computer network 、 Mutual authentication 、 Network Access Control 、 Authentication 、 Authentication protocol 、 IPsec
摘要: … In this paper, we analyze the security of two ultra-lightweight RFID … ultra-lightweight, since they use only simple bitwise operations to achieve mutual authentication between the RFID …