A Mutual Authentication Protocol using Key Change Step by Step for RFID Systems
Vol. 35, No. 3, pp. 462-473, Mar. 2010
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
K. Chung, K. Kim, S. Oh, J. Lee, Y. Park, K. Ahn, "A Mutual Authentication Protocol using Key Change Step by Step for RFID Systems," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 3, pp. 462-473, 2010. DOI: .
[ACM Style]
Kyung-Ho Chung, Kyoung-Youl Kim, Se-Jin Oh, Jae-Kang Lee, Yong-Soo Park, and Kwang-Seon Ahn. 2010. A Mutual Authentication Protocol using Key Change Step by Step for RFID Systems. The Journal of Korean Institute of Communications and Information Sciences, 35, 3, (2010), 462-473. DOI: .
[KICS Style]
Kyung-Ho Chung, Kyoung-Youl Kim, Se-Jin Oh, Jae-Kang Lee, Yong-Soo Park, Kwang-Seon Ahn, "A Mutual Authentication Protocol using Key Change Step by Step for RFID Systems," The Journal of Korean Institute of Communications and Information Sciences, vol. 35, no. 3, pp. 462-473, 3. 2010.