메뉴 건너뛰기




Volumn , Issue , 2008, Pages 583-587

Lightweight RFID authentication protocol: An experimental study

Author keywords

RFID authentication; RFID cloning; RFID systems

Indexed keywords

ACCESS CONTROL; AUTHENTICATION; CRYPTOGRAPHY; INFORMATION TECHNOLOGY; LAWS AND LEGISLATION; MOBILE PHONES; RADIO NAVIGATION;

EID: 51949096616     PISSN: 13301012     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ITI.2008.4588475     Document Type: Conference Paper
Times cited : (1)

References (7)
  • 4
    • 51949104343 scopus 로고    scopus 로고
    • Manar El-Chammas, Bassam El-Khoury, and Antoun Halaby Implementing Security in RFID systems: The Tag Emulator. Online resource available at http://whitepapers.silicon.com/0,39024759,6 0113378p-39001632q,00. htm [03/03/2008].
    • Manar El-Chammas, Bassam El-Khoury, and Antoun Halaby Implementing Security in RFID systems: The "Tag Emulator". Online resource available at http://whitepapers.silicon.com/0,39024759,6 0113378p-39001632q,00. htm [03/03/2008].
  • 5
  • 7
    • 38649093940 scopus 로고    scopus 로고
    • Zongwei Luo, Terry Chan, Jenny S. Li1, Edward Wong, William Cheung2, Victor Ng, Wilton Fok, Experimental Analysis of an RFID Security Protocol, Proceedings of the IEEE International Conference on e-Business Engineering, October 2006.
    • Zongwei Luo, Terry Chan, Jenny S. Li1, Edward Wong, William Cheung2, Victor Ng, Wilton Fok, Experimental Analysis of an RFID Security Protocol, Proceedings of the IEEE International Conference on e-Business Engineering, October 2006.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.