A copy of this work was available on the public web and has been preserved in the Wayback Machine. The capture dates from 2018; you can also visit the original URL.
The file type is application/pdf
.
Lightweight Privacy-Preserving Authentication Protocols Secure against Active Attack in an Asymmetric Way
2008
IEICE transactions on information and systems
As pervasive computing technologies develop fast, the privacy ppprotection becomes a crucial issue and needs to be coped with very carefully. Typically, it is difficult to efficiently identify and manage plenty of the low-cost pervasive devices like Radio Frequency Identification Devices (RFID), without leaking any privacy information. In particular, the attacker may not only eavesdrop the communication in a passive way, but also mount an active attack to ask queries adaptively, which is
doi:10.1093/ietisy/e91-d.5.1457
fatcat:tt5opyt5pjf6nmp5kroykctfzi