Sign in

The Vulnerabilities Analysis and Design of the Security Protocol for RFID System.

Hyun Seok KimJung-Hyun OhJin-Young ChoiJin-Woo Kim
Published in: CIT (2006)
Keyphrases
  • security protocols
  • data analysis
  • automated design
  • data mining
  • software architecture