Login / Signup
Design and analysis of security protocol for RFID without back-end database.
Yong-sheng Hao
Shao-jie Ren
Published in:
ICIA (2015)
Keyphrases
</>
back end
detailed design
database
databases
data management
security protocols
data analysis
design process
relational databases
user interface
web services
rfid tags
data model
low cost
data types
automated design
data mining