Have a personal or library account? Click to login
Review on RFID Identity Authentication Protocols Based on Hash Function Cover

Review on RFID Identity Authentication Protocols Based on Hash Function

By: Yang Bing,  Liu Baolong and  Chen Hua  
Open Access
|Apr 2018

Download Article

Download the full article as a PDF file.

Language: English
Page range: 72 - 82
Published on: Apr 7, 2018
Published by: Xi’an Technological University
In partnership with: Paradigm Publishing Services
Publication frequency: 4 issues per year

© 2018 Yang Bing, Liu Baolong, Chen Hua, published by Xi’an Technological University
This work is licensed under the Creative Commons Attribution-NonCommercial-NoDerivatives 4.0 License.