Published in

Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering, p. 254-267

DOI: 10.1007/978-3-642-16644-0_23

Links

Tools

Export citation

Search in Google Scholar

Wide–Weak Privacy–Preserving RFID Authentication Protocols

Proceedings article published in 2010 by Yong Ki Lee, Lejla Batina, Dave Singelée, Ingrid Verbauwhede
This paper is available in a repository.
This paper is available in a repository.

Full text: Download

Green circle
Preprint: archiving allowed
Green circle
Postprint: archiving allowed
Red circle
Published version: archiving forbidden
Data provided by SHERPA/RoMEO