Login / Signup
Privacy analysis and improvements of two recent RFID authentication protocols.
Karim Baghery
Behzad Abdolmaleki
Bahareh Akhbari
Mohammad Reza Aref
Published in:
ISCISC (2014)
Keyphrases
</>
authentication protocol
rfid systems
rfid tags
data mining
data analysis
supply chain
software engineering
data management
computer systems
similarity search
public key
formal analysis
radio frequency identification