However, these protocols
suffers from either privacy and security issues or efficiency.
There are also several adversarial models are proposed in order
to formalize security and privacy in RFID [1], [9], [19], [22],
[23]. In this paper, we focus on only lightweight authentication
protocols.
However, these protocolssuffers from either privacy and security issues or efficiency.There are also several adversarial models are proposed in orderto formalize security and privacy in RFID [1], [9], [19], [22],[23]. In this paper, we focus on only lightweight authenticationprotocols.
การแปล กรุณารอสักครู่..
