Sign in

Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols.

Gaurav KapoorSelwyn Piramuthu
Published in: NetCoM (2009)
Keyphrases
  • supply chain
  • anti collision
  • digital libraries
  • transfer learning
  • information security
  • real time
  • neural network
  • data collection
  • countermeasures
  • rfid technology
  • security flaws