Login / Signup
Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification Procedure.
Jia Zhai
Chang Mok Park
Gi-Nam Wang
Published in:
ICCSA (4) (2006)
Keyphrases
</>
security protocols
rfid tags
rfid systems
anti collision
automated design
cryptographic algorithms
low cost
artificial immune algorithm
supply chain
radio frequency identification
authentication protocol
rfid technology
cost effective
security services
key management
data distribution
data collection