Research Article
A RFID Authentication Protocol for Epidemic Prevention and Epidemic Emergency Management Systems
Table 5
Comparisons of computation cost.
| Computation cost | [15] | [29] | [30] | [10] | [28] | [1] | Ours |
| CCtag | 5Th | 2Th | 4Th | 3Th | 2Th | 2Th | 2Th | CCRi | 2Th | 2Th | 2Th | 2Th | 3Th | 2Th | 1Th | CCS | 7Th | 3Th | 6Th | 5Th | 5Th | 4Th + 2Tse | 3Th + 2Tse | CCTotal | 14Th | 7Th | 12Th | 10Th | 10Th | 8Th + 2Tse | 6Th + 2Tse |
|
|
CC: computation cost; Th: CC of single hash function; Tse: CC of symmetric encryption/decryption.
|