Research Article
An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing
Table 4
Notations along with their descriptions.
| Symbol | Description |
| | tag, reader, and cloud server | | Unique identities of and | | Password of | | Long-term private secret key of the | | Operations of bitwise concatenation and bitwise XOR | | Session key established between and | | Physically unclonable function | | Cryptographic collision-resistant one-way hash function | | Random numbers | | Timestamps used at transmission | | Maximum threshold transmission delay allowed | | Validation check, if expression matches or not | | An adversary |
|
|