From post

Hash-Based RFID Security Protocol Using Randomly Key-Changed Identification Procedure.

, , и . ICCSA (4), том 3983 из Lecture Notes in Computer Science, стр. 296-305. Springer, (2006)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed.

 

Другие публикации лиц с тем же именем