Login / Signup
Authentication protocols for the broadband ISDN billing system.
Chi-Chun Lo
Yi-Chun Yeh
Published in:
NOMS (2000)
Keyphrases
</>
authentication protocol
smart card
security analysis
public key
lightweight
rfid tags
secret key
security protocols
hash functions
cryptographic protocols
rfid systems
ban logic
service management
resource constrained