Sign in

Research and Application of RFID System Security Authentication Protocol Based on ECC Algorithm.

Qiaohong ZuKui Cai
Published in: HCC (2018)
Keyphrases
  • authentication protocol
  • real time
  • query processing
  • nearest neighbor
  • intrusion detection
  • security analysis