Research Article
A RFID Authentication Protocol for Epidemic Prevention and Epidemic Emergency Management Systems
Table 5
Comparisons of computation cost.
| | Computation cost | [15] | [29] | [30] | [10] | [28] | [1] | Ours |
| | CCtag | 5Th | 2Th | 4Th | 3Th | 2Th | 2Th | 2Th | | CCRi | 2Th | 2Th | 2Th | 2Th | 3Th | 2Th | 1Th | | CCS | 7Th | 3Th | 6Th | 5Th | 5Th | 4Th + 2Tse | 3Th + 2Tse | | CCTotal | 14Th | 7Th | 12Th | 10Th | 10Th | 8Th + 2Tse | 6Th + 2Tse |
|
|
CC: computation cost; Th: CC of single hash function; Tse: CC of symmetric encryption/decryption.
|