Have a personal or library account? Click to login
Review on RFID Identity Authentication Protocols Based on Hash Function Cover

Review on RFID Identity Authentication Protocols Based on Hash Function

By: Yang Bing,  Liu Baolong and  Chen Hua  
Open Access
|Apr 2018

Authors

Yang Bing

1769579475@qq.com

School of Computer Science and Engineering, Xi’an Technological University, Xi’an, China

Liu Baolong

24503148@qq.com

School of Computer Science and Engineering, Xi’an Technological University, Xi’an, China

Chen Hua

School of Computer Science and Engineering, Xi’an Technological University, Xi’an, China
Language: English
Page range: 72 - 82
Published on: Apr 7, 2018
Published by: Xi’an Technological University
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2018 Yang Bing, Liu Baolong, Chen Hua, published by Xi’an Technological University
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.