Login / Signup

Analysis of Xiao et al.'s authentication protocol conforming to EPC C1 G2 standard.

Behzad AbdolmalekiKarim BagheryBahareh AkhbariMohammad Reza Aref
Published in: IST (2016)
Keyphrases
  • authentication protocol
  • data analysis
  • database systems
  • software engineering
  • low cost
  • quality of service