Sign in

Novel implementation of defence strategy of relay attack based on cloud in RFID systems.

He XuWeiwei ShenPeng LiKeith MayesRuchuan WangDashen LiShengxiang Yang
Published in: Int. J. Inf. Comput. Secur. (2019)
Keyphrases
  • rfid systems
  • authentication protocol
  • cloud computing
  • rfid technology
  • artificial intelligence
  • radio frequency identification
  • real time
  • supply chain
  • cost effective
  • rfid tags