Jiezhong Gong

  • Citations Per Year
Learn More
Many kinds of protocols have been designed to resolve the security and privacy problems of RFID systems. In this paper, we illustrate a new RFID authentication protocol based on Trivium, inspired from the Challenge-Response based RFID authentication protocol for distributed database environment. The proposed protocol can prevent many attacks including(More)
  • 1