Hash Function-based Secure Authentication Protocol for Improving Efficiency in RFID System
Vol. 34, No. 4, pp. 428-434, Apr. 2009
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
I. Kim, "Hash Function-based Secure Authentication Protocol for Improving Efficiency in RFID System," The Journal of Korean Institute of Communications and Information Sciences, vol. 34, no. 4, pp. 428-434, 2009. DOI: .
[ACM Style]
Ik-Su Kim. 2009. Hash Function-based Secure Authentication Protocol for Improving Efficiency in RFID System. The Journal of Korean Institute of Communications and Information Sciences, 34, 4, (2009), 428-434. DOI: .
[KICS Style]
Ik-Su Kim, "Hash Function-based Secure Authentication Protocol for Improving Efficiency in RFID System," The Journal of Korean Institute of Communications and Information Sciences, vol. 34, no. 4, pp. 428-434, 4. 2009.