| Document Date: 2011-04-26 12:59:27 Open Document File Size: 1,36 MBShare Result on Facebook
Company RFID Systems / EMAP / / Currency cent / / / Event FDA Phase / Product Issues / / Facility University of Washington / University of Arizona / / IndustryTerm lightweight authentication protocol / lightweight protocols / human-tocomputer authentication protocol / honest protocol / secure protocols / Symmetric key solutions / cheaper solutions / secure symmetric key solutions / secure protocol / real life applications / symmetric key solution / identification protocol / polynomial-time algorithm / mutual authentication protocols / secure wireless channel / cheaper products / authentication protocols / mutual authentication protocol / / Organization Network Security Lab / University of Washington / Seattle / University of Arizona / / Person Van Deursen / Radha Poovendran / / Position HB / adversarial model suitable / formal model for analyzing location privacy / HB and HB / / Product RFID / Figure / / Technology encryption / lightweight authentication protocol / symmetric key encryption / HB+ protocol / human-tocomputer authentication protocol / cryptography / mutual authentication protocol / public key / computationally secure protocols / authentication protocols / unconditionally secure protocols / polynomial-time algorithm / lightweight protocols / mutual authentication protocols / unconditionally secure protocol / theoretically secure authenticated encryption / secure authentication protocols / identification protocol / secret key / Buttyan protocols / universal re-encryption / proposed protocol / /
SocialTag |