Research Article
An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing
Table 5
Tag registration phases of our scheme.
| | Cloud database server |
| Inputs | | Generates challenge | | Computes | Verifies | | Computes by private key of S | | | | | , deletes and stores | | Stores |
|
|