Performance Evaluation of Authentication Protocol for Mobile RFID Privacy
Vol. 36, No. 6, pp. 618-630, Jun. 2011
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
T. Eom and J. Yi, "Performance Evaluation of Authentication Protocol for Mobile RFID Privacy," The Journal of Korean Institute of Communications and Information Sciences, vol. 36, no. 6, pp. 618-630, 2011. DOI: .
[ACM Style]
Taeyang Eom and Jeong-Hyun Yi. 2011. Performance Evaluation of Authentication Protocol for Mobile RFID Privacy. The Journal of Korean Institute of Communications and Information Sciences, 36, 6, (2011), 618-630. DOI: .
[KICS Style]
Taeyang Eom and Jeong-Hyun Yi, "Performance Evaluation of Authentication Protocol for Mobile RFID Privacy," The Journal of Korean Institute of Communications and Information Sciences, vol. 36, no. 6, pp. 618-630, 6. 2011.