Login / Signup
Critical Evaluation of RFID Security Protocols.
Azam Zavvari
Ahmed Patel
Published in:
Int. J. Inf. Secur. Priv. (2012)
Keyphrases
</>
security protocols
automated design
rfid tags
artificial immune algorithm
rfid systems
data collection
artificial intelligence
data processing
low cost
key management
security services
cryptographic algorithms