2008
DOI: 10.1016/j.comcom.2008.05.006
|View full text |Cite
|
Sign up to set email alerts
|

A study on secure RFID mutual authentication scheme in pervasive computing environment

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
13
0
1

Year Published

2010
2010
2022
2022

Publication Types

Select...
6
2
2

Relationship

0
10

Authors

Journals

citations
Cited by 43 publications
(31 citation statements)
references
References 5 publications
0
13
0
1
Order By: Relevance
“…Thus, protocols or schemes providing security for RFID applications need to take the following concerns into consideration [2][3][4][5][6].…”
Section: Introductionmentioning
confidence: 99%
“…Thus, protocols or schemes providing security for RFID applications need to take the following concerns into consideration [2][3][4][5][6].…”
Section: Introductionmentioning
confidence: 99%
“…The need for security and privacy in RFID systems is well recognized and there has been a significant amount of work in this area [9], [10], [11], [12], [13], [14]. However, the practical implementation of most schemes are limited by two factors.…”
Section: Related Workmentioning
confidence: 99%
“…As the use of RFID increases, many security and privacy issues are being raised. The following threats are of the most concern [4][5][6][7][8].…”
Section: Introductionmentioning
confidence: 99%