The Study of RFID Authentication Scheme-Under The Insecure Wireless Environment
碩士 === 中國文化大學 === 資訊管理學系 === 103 === From the literature, it is known that Yeh et al. has improved Chen et al.’s authenti-cation scheme so that it can resist against attacks like impersonation attack, location privacy and replay attack. However, transmitting data in a wireless way is very popular to...
Main Authors: | , |
---|---|
Other Authors: | |
Format: | Others |
Language: | zh-TW |
Published: |
2015
|
Online Access: | http://ndltd.ncl.edu.tw/handle/hw9n4x |