Login / Signup

Critical Evaluation of RFID Security Protocols.

Azam ZavvariAhmed Patel
Published in: Int. J. Inf. Secur. Priv. (2012)
Keyphrases
  • security protocols
  • automated design
  • rfid tags
  • artificial immune algorithm
  • rfid systems
  • data collection
  • artificial intelligence
  • data processing
  • low cost
  • key management
  • security services
  • cryptographic algorithms