• search
    search
  • reviewers
    reviewers
  • feeds
    feeds
  • assignments
    assignments
  • settings
  • logout

Neural cryptography applied to key management protocol with mutual authentication in RFID systems.

Macedo FirminoGlaucio B. BrandaoAna M. G. GuerreiroRicardo Alexsandro de Medeiros Valentim
Published in: ICITST (2009)
Keyphrases