@dblp

Weaknesses in Two Recent Lightweight RFID Authentication Protocols.

, , , , and . Inscrypt, volume 6151 of Lecture Notes in Computer Science, page 383-392. Springer, (2009)

Links and resources

Tags