Authenticating pervasive devices with human protocols

CRYPTO, pp. 293-308, 2005.

Cited by: 855|Bibtex|Views48|Links
EI
Keywords:
human protocolserious security riskhb protocollow-cost implementationlow-cost pervasive deviceMore(14+)

Abstract:

Forgery and counterfeiting are emerging as serious security risks in low-cost pervasive computing devices. These devices lack the computational, storage, power, and communication resources necessary for most cryptographic authentication schemes. Surprisingly, low-cost pervasive devices like Radio Frequency Identification (RFID) tags share...More

Code:

Data:

Your rating :
0

 

Tags
Comments