Security Analysis and Improvements of Authentication Protocol for Privacy Protection in RFID Systems
Vol. 41, No. 5, pp. 581-591, May 2016
Abstract
Statistics
Cumulative Counts from November, 2022
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
Multiple requests among the same browser session are counted as one view. If you mouse over a chart, the values of data points will be shown.
|
Cite this article
[IEEE Style]
J. Kim and D. Won, "Security Analysis and Improvements of Authentication Protocol for Privacy Protection in RFID Systems," The Journal of Korean Institute of Communications and Information Sciences, vol. 41, no. 5, pp. 581-591, 2016. DOI: .
[ACM Style]
Jiye Kim and Dongho Won. 2016. Security Analysis and Improvements of Authentication Protocol for Privacy Protection in RFID Systems. The Journal of Korean Institute of Communications and Information Sciences, 41, 5, (2016), 581-591. DOI: .
[KICS Style]
Jiye Kim and Dongho Won, "Security Analysis and Improvements of Authentication Protocol for Privacy Protection in RFID Systems," The Journal of Korean Institute of Communications and Information Sciences, vol. 41, no. 5, pp. 581-591, 5. 2016.