Inproceedings,

Minimizing Information Leakage of Tree-Based RFID Authentication Protocols Using Alternate Tree-Walking.

, , and .
ACISP, volume 7372 of Lecture Notes in Computer Science, page 434-441. Springer, (2012)

Meta data

Tags

Users

  • @dblp

Comments and Reviews