Search filters

Weaknesses in another Gen2-based RFID authentication protocol

Image Image of a generic work. The text above it indicates that there is no free image of the work available, and that if you own one, you can click on the placeholder link to upload it.
Description
Author/s

author: Nasour Bagheri  Masoumeh Safkhani  Aikaterini Mitrokotsa 

Publication date November 2012
Language
Country of origin
Wikipedia link
Copyright status
Missing/wrong data? Edit Wikidata item