Sign in

A RFID Mutual Authentication Security Protocol Design and Analysis.

Xiaobing LiangYingjie LvBing ZhaoYing LiuZhiqiang SunWei Cen
Published in: 3PGCIC (2014)
Keyphrases
  • rfid tags
  • security protocols
  • data analysis
  • mutual authentication
  • authentication protocol
  • real time
  • end users
  • data management
  • data mining techniques
  • software architecture