Introduction - If you have any usage issues, please Google them yourself
Some of the existing authentication protocol based on ECC is briefly analyzed, and points out the security loophole. An improved two-way authentication protocol based on RFID, and security analysis and simulation to the improved protocol for implementation.