Understanding RFID counting protocols
10.1145/2500423.2500431
Saved in:
Main Authors: | Chen, B., Zhou, Z., Yu, H. |
---|---|
Other Authors: | COMPUTER SCIENCE |
Format: | Conference or Workshop Item |
Published: |
2014
|
Subjects: | |
Online Access: | http://scholarbank.nus.edu.sg/handle/10635/78412 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | National University of Singapore |
Similar Items
-
A Security and Performance Evaluation of Hash-Based Rfid Protocols
by: Lim, Tong-Lee, et al.
Published: (2008) -
Security and Performance Analysis for RFID Protocols
by: LIANG, Bing
Published: (2010) -
Vulnerability Analysis of RFID Protocols for Tag Ownership Transfer
by: PERIS-LOPEZ, Pedro, et al.
Published: (2010) -
Interactive learning on RFID via simple project
by: Sun, Yao Zhou
Published: (2024) -
A new framework for RFID privacy
by: DENG, Robert H., et al.
Published: (2010)