Login / Signup
The Vulnerabilities Analysis and Design of the Security Protocol for RFID System.
Hyun Seok Kim
Jung-Hyun Oh
Jin-Young Choi
Jin-Woo Kim
Published in:
CIT (2006)
Keyphrases
</>
security protocols
data analysis
automated design
data mining
software architecture