Login / Signup
Novel implementation of defence strategy of relay attack based on cloud in RFID systems.
He Xu
Weiwei Shen
Peng Li
Keith Mayes
Ruchuan Wang
Dashen Li
Shengxiang Yang
Published in:
Int. J. Inf. Comput. Secur. (2019)
Keyphrases
</>
rfid systems
authentication protocol
cloud computing
rfid technology
artificial intelligence
radio frequency identification
real time
supply chain
cost effective
rfid tags