Article,

Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols.

, , , and .
Trans. Emerging Telecommunications Technologies, 23 (7): 618-624 (2012)

Meta data

Tags

Users

  • @dblp

Comments and Reviews