03.07.2013 Views

RFID-enabled Extensible Authentication Framework and Its ...

RFID-enabled Extensible Authentication Framework and Its ...

RFID-enabled Extensible Authentication Framework and Its ...

SHOW MORE
SHOW LESS

Create successful ePaper yourself

Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.

List of Tables<br />

2.1 <strong>RFID</strong> Applications . . . . . . . . . . . . . . . . . . . . . 8<br />

3.1 Code Field . . . . . . . . . . . . . . . . . . . . . . . . . . 20<br />

3.2 Type Field . . . . . . . . . . . . . . . . . . . . . . . . . . 21<br />

3.3 Data Field determined by Type-Code . . . . . . . . . . . 22<br />

4.1 Comparison with other Hash-based <strong>Authentication</strong> Schemes 28<br />

4.2 Security Properties of REAF-BC Methods . . . . . . . . 32<br />

4.3 Comparison with other AES <strong>Authentication</strong> Protocols . . 33<br />

vi

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!