|
Volumn , Issue , 2008, Pages
|
Security analysis of Tu and Piramuthu's protocol
|
Author keywords
[No Author keywords available]
|
Indexed keywords
CRYPTOGRAPHY;
RADIO FREQUENCY IDENTIFICATION (RFID);
TECHNICAL PRESENTATIONS;
COUNTER-MEASURES;
DISTANCE BOUNDING;
FALSE ACCEPTANCE RATIOS;
PHYSICAL LAYERS;
PROTOCOL STACKS;
RELAY ATTACKS;
SECURITY ANALYSES;
SECURITY PROTOCOLS;
TECHNICAL RESOURCES;
TERRORIST ATTACKS;
SECURITY OF DATA;
|
EID: 58049137098
PISSN: None
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/NTMS.2008.ECP.88 Document Type: Conference Paper |
Times cited : (9)
|
References (16)
|