Ads
-
Related paper
- Security Analysis and Improvement of Wei-Chi Ku and Yi-Han Chen’s RFID protocol
- Improvement of the Efficient Mutual Authentication Protocol for Passive RFID Tags (EMAP)
- Security and Privacy Flaws in a Recent Authentication Protocol for EPC C1 G2 RFID Tags
- RFID Tag Ownership Transfer Protocol of Multi-owner and Multi-tag Based on EPC C1G2 Protocol
- Security Analysis and Improvement of Integrated Security Management System
- Analysis and Improvement of the Lightweight Mutual Authentication Protocol under EPC C-1 G-2 Standard
- UNDERSTANDING THE ASSOCIATION BETWEEN PANDEMIC PROTOCOL ADHERENCE AND NEED FOR PROTOCOL IMPROVEMENT IN THE HIGHER EDUCATION SYSTEM
- Security Analysis of the BB84 Protocol in IoT Networks
- A lightweight RFID authentication protocol based on Rabin cryptosystem
- Vulnerabilities and Improvements on HRAP+, a Hash-Based RFID Authentication Protocol
