Login / Signup

Research of RFID Certification Security Protocol based on Hash Function and DES Algorithm.

Bin XuLi-Hui ZhangXiao-Pin Tan
Published in: J. Networks (2013)
Keyphrases
  • artificial immune algorithm
  • similarity measure
  • neural network
  • real time
  • databases
  • low cost
  • access control
  • cost effective
  • hash functions
  • hamming distance