RFID-enabled Extensible Authentication Framework and Its ...
RFID-enabled Extensible Authentication Framework and Its ...
RFID-enabled Extensible Authentication Framework and Its ...
Create successful ePaper yourself
Turn your PDF publications into a flip-book with our unique Google optimized e-Paper software.
List of Tables<br />
2.1 <strong>RFID</strong> Applications . . . . . . . . . . . . . . . . . . . . . 8<br />
3.1 Code Field . . . . . . . . . . . . . . . . . . . . . . . . . . 20<br />
3.2 Type Field . . . . . . . . . . . . . . . . . . . . . . . . . . 21<br />
3.3 Data Field determined by Type-Code . . . . . . . . . . . 22<br />
4.1 Comparison with other Hash-based <strong>Authentication</strong> Schemes 28<br />
4.2 Security Properties of REAF-BC Methods . . . . . . . . 32<br />
4.3 Comparison with other AES <strong>Authentication</strong> Protocols . . 33<br />
vi