Attack and Solution on 3K-RFID Authentication Protocol
Vol. 34, No. 6, pp. 578-587, Jun. 2009
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
E. Yoon, K. Bu, K. Ha, K. Yoo, "Attack and Solution on 3K-RFID Authentication Protocol," The Journal of Korean Institute of Communications and Information Sciences, vol. 34, no. 6, pp. 578-587, 2009. DOI: .
[ACM Style]
Eun-Jun Yoon, Ki-Dong Bu, Kyeoung-Ju Ha, and Kee-Young Yoo. 2009. Attack and Solution on 3K-RFID Authentication Protocol. The Journal of Korean Institute of Communications and Information Sciences, 34, 6, (2009), 578-587. DOI: .
[KICS Style]
Eun-Jun Yoon, Ki-Dong Bu, Kyeoung-Ju Ha, Kee-Young Yoo, "Attack and Solution on 3K-RFID Authentication Protocol," The Journal of Korean Institute of Communications and Information Sciences, vol. 34, no. 6, pp. 578-587, 6. 2009.