Authenticating pervasive devices with human protocols
CRYPTO, pp. 293-308, 2005.
human protocolserious security riskhb protocollow-cost implementationlow-cost pervasive deviceMore(14+)
Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication resources necessary for most cryptographic authentication schemes. Surprisingly, low-cost pervasive devices like Radio Frequency Identification (RFID) tags share...More
PPT (Upload PPT)