Login / Signup
Edge computing-based security authentication algorithm for multiple RFID tags.
He Xu
Jie Ding
Peng Li
Ruchuan Wang
Published in:
Int. J. Intell. Inf. Database Syst. (2018)
Keyphrases
</>
rfid tags
lightweight
security mechanisms
wireless sensor networks
cloud computing
intrusion detection