Research Article

An Enhanced RFID-Based Authentication Protocol using PUF for Vehicular Cloud Computing

Table 7

Login and authentication phases of our scheme.

Reader Cloud database server

Logs on by
Computes
Verifies
Generates
Computes
Verifies , compute
Computes
Verifies and
Extracts
Verifies
,
Extracts
Verifies
Generates , computes
Checks and
Verifies and computesVerifies
Checks
to set as the session key