Sign in

Vulnerabilities in some recently proposed RFID ownership transfer protocols.

Gaurav KapoorSelwyn Piramuthu
Published in: IEEE Commun. Lett. (2010)
Keyphrases
  • low cost
  • real time
  • supply chain
  • information security
  • security issues
  • anti collision
  • decision making
  • rfid tags
  • rfid technology
  • radio frequency identification
  • security vulnerabilities