Login / Signup
Research and Application of RFID System Security Authentication Protocol Based on ECC Algorithm.
Qiaohong Zu
Kui Cai
Published in:
HCC (2018)
Keyphrases
</>
authentication protocol
real time
query processing
nearest neighbor
intrusion detection
security analysis