## Found 178 Documents (Results 1–100)

100
MathJax

MSC:  90Bxx
Full Text:

### Impact of RFID technology on coordination of a three-tier fresh product supply chain. (English)Zbl 07505865

MSC:  90B05 90B06
Full Text:

MSC:  90Bxx
Full Text:

### Cloud-based lightweight secure RFID mutual authentication protocol in IoT. (English)Zbl 1458.68057

MSC:  68P27 68M11 94A62
Full Text:

MSC:  90Bxx
Full Text:

### Game modes and investment cost locations in radio-frequency identification (RFID) adoption. (English)Zbl 1443.90108

MSC:  90B05 91A80 91B26
Full Text:

### Enhanced least square based dynamic OD matrix estimation using radio frequency identification data. (English)Zbl 07316540

MSC:  90Cxx 90Bxx
Full Text:

### An optimization model for traceable closed-loop supply chain networks. (English)Zbl 1481.90057

MSC:  90B06 90C11 90C90
Full Text:

### A continuous approximation approach for supply network design considering radio frequency identification adoption. (English)Zbl 1430.90036

MSC:  90B05 90B06
Full Text:

MSC:  70Q05
Full Text:

MSC:  94A62
Full Text:

### Accelerate the classification statistics in RFID systems. (English)Zbl 1455.94211

MSC:  94A62 62H30
Full Text:

### Multi-attribute counterfeiting tag identification protocol in large-scale RFID system. (English)Zbl 1452.94100

Qing, Sihan (ed.) et al., Information and communications security. 19th international conference, ICICS 2017, Beijing, China, December 6–8, 2017. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10631, 352-362 (2018).
MSC:  94A60
Full Text:

### Optimization of warehouse picking route based on deviation ratio. (Chinese. English summary)Zbl 1424.90024

MSC:  90B06 90C27

### The realization of radio frequency identification handset antenna based on Internet of Things. (English)Zbl 1397.78042

MSC:  78A50 94A05
Full Text:

### Formal analysis of distance bounding with secure hardware. (English)Zbl 1440.94097

Preneel, Bart (ed.) et al., Applied cryptography and network security. 16th international conference, ACNS 2018, Leuven, Belgium, July 2–4, 2018. Proceedings. Cham: Springer. Lect. Notes Comput. Sci. 10892, 579-597 (2018).
MSC:  94A62 68P25
Full Text:

### Radio-frequency identification (RFID) adoption with inventory misplacement under retail competition. (English)Zbl 1403.90067

MSC:  90B05 90B06 91A80
Full Text:

### Two mutual authentication protocols based on zero-knowledge proofs for RFID systems. (English)Zbl 06889992

Kim, Howon (ed.) et al., Information security and cryptology – ICISC 2017. 20th international conference, Seoul, South Korea, November 29 – December 1, 2017. Revised selected papers. Cham: Springer. Lect. Notes Comput. Sci. 10779, 267-283 (2018).
MSC:  68P25 94A60
Full Text:

### Stein-rule combination forecasting on RFID based supply chain. (English)Zbl 1394.90136

MSC:  90B06 90B05
Full Text:

MSC:  90-10 90B05 90B30
Full Text:

### Classification statistics in RFID systems. (English)Zbl 1474.62252

Gao, Xiaofeng (ed.) et al., Combinatorial optimization and applications. 11th international conference, COCOA 2017, Shanghai, China, December 16–18, 2017. Proceedings. Part II. Cham: Springer. Lect. Notes Comput. Sci. 10628, 425-440 (2017).
MSC:  62H30 68T10
Full Text:

### Particle swarm optimizer with cloud generators for optimizing RFID network. (English)Zbl 1389.90351

MSC:  90C59 68T20

MSC:  90B80
Full Text:

MSC:  90B05
Full Text:

### Distributed computer and communication networks. 20th international conference, DCCN 2017, Moscow, Russia, September 25–29, 2017. Proceedings. (English)Zbl 1393.68018

Communications in Computer and Information Science 700. Cham: Springer (ISBN 978-3-319-66835-2/pbk; 978-3-319-66836-9/ebook). xiv, 478 p. (2017).
Full Text:

### Localised multisecret sharing. (English)Zbl 1409.94916

MSC:  94A62 94A60
Full Text:

### Efficient tag path authentication protocol with less tag memory. (English)Zbl 1403.94100

Bao, Feng (ed.) et al., Information security practice and experience. 12th international conference, ISPEC 2016, Zhangjiajie, China, November 16–18, 2016. Proceedings. Cham: Springer (ISBN 978-3-319-49150-9/pbk; 978-3-319-49151-6/ebook). Lecture Notes in Computer Science 10060, 255-270 (2016).
MSC:  94A62
Full Text:

### Performance analysis of tag identification time in passive RFID systems. (English)Zbl 1409.90035

Proceedings of the 11th international conference on queueing theory and network applications, QTNA 2016, Wellington, New Zealand, December 13–15, 2016. New York, NY: Association for Computing Machinery (ACM). Paper No. 25, 4 p. (2016).
MSC:  90B06 65K05
Full Text:

Full Text:

### A new heuristic for learning Bayesian networks from limited datasets: a real-time recommendation system application with RFID systems in grocery stores. (English)Zbl 1357.90024

MSC:  90B15 90C59
Full Text:

### Efficient public-key distance bounding protocol. (English)Zbl 1407.94129

Cheon, Jung Hee (ed.) et al., Advances in cryptology – ASIACRYPT 2016. 22nd international conference on the theory and application of cryptology and information security, Hanoi, Vietnam, December 4-8, 2016. Proceedings. Part II. Berlin: Springer. Lect. Notes Comput. Sci. 10032, 873-901 (2016).
MSC:  94A60
Full Text:

### The Simeck family of lightweight block ciphers. (English)Zbl 1380.94132

Güneysu, Tim (ed.) et al., Cryptographic hardware and embedded systems – CHES 2015. 17th international workshop, Saint-Malo, France, September 13–16, 2015. Proceedings. Berlin: Springer (ISBN 978-3-662-48323-7/pbk; 978-3-662-48324-4/ebook). Lecture Notes in Computer Science 9293, 307-329 (2015).
MSC:  94A60
Full Text:

MSC:  94A62
Full Text:

MSC:  90C59
Full Text:

### Towards a lightweight, secure, and untraceable RFID authentication protocol. (English)Zbl 1333.94003

Göttingen: Univ. Göttingen (Diss.). vii, 92 p. (2015).
MSC:  94-02 94A60 94A62
Full Text:

### Weaknesses in two RFID authentication protocols. (English)Zbl 1441.94097

El Hajji, Said (ed.) et al., Codes, cryptology, and information security. First international conference, C2SI 2015, Rabat, Morocco, May 26–28, 2015. Proceedings – in honor of Thierry Berger. Cham: Springer. Lect. Notes Comput. Sci. 9084, 162-172 (2015).
MSC:  94A62
Full Text:

### A provably secure offline RFID yoking-proof protocol with anonymity. (English)Zbl 1382.94144

Eisenbarth, Thomas (ed.) et al., Lightweight cryptography for security and privacy. Third international workshop, LightSec 2014, Istanbul, Turkey, September 1–2, 2014. Revised selected papers. Cham: Springer (ISBN 978-3-319-16362-8/pbk; 978-3-319-16363-5/ebook). Lecture Notes in Computer Science 8898, 155-167 (2015).
MSC:  94A60 94A62
Full Text:

### Building of a mathematics-based RFID localization framework. (English)Zbl 1340.90043

MSC:  90B18 90B85

MSC:  94A60

### Vulnerability aware graphs for RFID protocol security benchmarking. (English)Zbl 1328.68023

MSC:  68M12 94A60 94A62
Full Text:

### SAT representation of randomly deployed wireless sensor networks. (English)Zbl 1372.68204

Kovács, Emőd (ed.) et al., Proceedings of the 9th international conference on applied informatics (ICAI 2014), Eger, Hungary, January 29 – February 1, 2014. Volume 2. Eger: Eszterhazy Karoly University of Applied Sciences (ISBN 978-615-5297-19-9). 101-111 (2014).
MSC:  68R10 68M10 68M15
Full Text:

### Should retail stores also RFID-tag ‘cheap’ items? (English)Zbl 1339.90220

MSC:  90B90 90B05 90B50
Full Text:

### A practical attack on patched MIFARE Classic. (English)Zbl 1347.94028

Lin, Dongdai (ed.) et al., Information security and cryptology. 9th international conference, Inscrypt 2013, Guangzhou, China, November 27–30, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-12086-7/pbk; 978-3-319-12087-4/ebook). Lecture Notes in Computer Science 8567, 150-164 (2014).
MSC:  94A60
Full Text:

### A provable secure batch authentication scheme for EPCGen2 tags. (English)Zbl 1368.94143

Chow, Sherman S.M. (ed.) et al., Provable security. 8th international conference, ProvSec 2014, Hong Kong, China, October 9–10, 2014. Proceedings. Berlin: Springer (ISBN 978-3-319-12474-2/pbk). Lecture Notes in Computer Science 8782, 103-116 (2014).
MSC:  94A62
Full Text:

MSC:  94A62
Full Text:

### On the security of RFID anti-counting security protocol (ACSP). (English)Zbl 1354.94058

MSC:  94A62 68P30
Full Text:

### Improved linear cryptanalysis of reduced-round MIBS. (English)Zbl 1417.94041

Yoshida, Maki (ed.) et al., Advances in information and computer security. 9th international workshop on security, IWSEC 2014, Hirosaki, Japan, August 27–29, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8639, 204-220 (2014).
MSC:  94A60
Full Text:

### On the security proof of an authentication protocol from Eurocrypt 2011. (English)Zbl 1417.94094

Yoshida, Maki (ed.) et al., Advances in information and computer security. 9th international workshop on security, IWSEC 2014, Hirosaki, Japan, August 27–29, 2014. Proceedings. Berlin: Springer. Lect. Notes Comput. Sci. 8639, 187-203 (2014).
MSC:  94A62 68M12
Full Text:

### A multi-criteria decision making model for advanced repair-to-order and disassembly-to-order system. (English)Zbl 1305.90234

MSC:  90B50 90B25
Full Text:

### Evaluation of cycle-count policies for supply chains with inventory inaccuracy and implications on RFID investments. (English)Zbl 1304.90014

MSC:  90B05 90B06
Full Text:

### Application of RFID-technology to the problem of traffic control through roadway intersections. (English)Zbl 1298.90024

Vishnevsky, Vladimir (ed.) et al., Distributed computer and communication networks. 17th international conference, DCCN 2013, Moscow, Russia, October 7–10, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-05208-3/pbk; 978-3-319-05209-0/ebook). Communications in Computer and Information Science 279, 256-266 (2014).
MSC:  90B20

### New generation of safety systems for automobile traffic control using RFID technology and broadband wireless communication. (English)Zbl 1298.90012

Vishnevsky, Vladimir (ed.) et al., Distributed computer and communication networks. 17th international conference, DCCN 2013, Moscow, Russia, October 7–10, 2013. Revised selected papers. Cham: Springer (ISBN 978-3-319-05208-3/pbk; 978-3-319-05209-0/ebook). Communications in Computer and Information Science 279, 145-153 (2014).

### Consumer preference and service quality management with RFID. (English)Zbl 1296.90032

MSC:  90B22 91B08
Full Text:

MSC:  91B08
Full Text:

### The impact of false-negative reads on the performance of RFID-based shelf inventory control policies. (English)Zbl 1348.90034

MSC:  90B05 90B30
Full Text:

### Strong security and privacy of RFID system for internet of things infrastructure. (English)Zbl 1355.68023

Gierlichs, Benedikt (ed.) et al., Security, privacy, and applied cryptography engineering. Third international conference, SPACE 2013, Kharagpur, India, October 19–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-41223-3/pbk). Lecture Notes in Computer Science 8204, 56-69 (2013).
Full Text:

### Flowgraph models for estimating total time of authentication process in RFID system. (English)Zbl 1293.94106

MSC:  94A62 93C95
Full Text:

### An efficient B$$^{+}$$-tree design for main-memory database systems with strong access locality. (English)Zbl 1293.68089

MSC:  68P05 68P15
Full Text:

MSC:  90B35
Full Text:

MSC:  90B06
Full Text:

### Never trust a bunny. (English)Zbl 1337.94093

Hoepman, Jaap-Henk (ed.) et al., Radio frequency identification. Security and privacy issues. 8th international workshop, RFIDSec 2012, Nijmegen, The Netherlands, July 2–3, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-36139-5/pbk). Lecture Notes in Computer Science 7739, 137-148 (2013).
MSC:  94A62
Full Text:

### Pushing the limits of SHA-3 hardware implementations to fit on RFID. (English)Zbl 1353.94068

Bertoni, Guido (ed.) et al., Cryptographic hardware and embedded systems – CHES 2013. 15th international workshop, Santa Barbara, CA, USA, August 20–23, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-40348-4/pbk). Lecture Notes in Computer Science 8086, 126-141 (2013).
MSC:  94A60
Full Text:

### An efficient and private RFID authentication protocol supporting ownership transfer. (English)Zbl 1412.94183

Avoine, Gildas (ed.) et al., Lightweight cryptography for security and privacy. Second international workshop, LightSec 2013, Gebze, Turkey, May 6–7, 2013. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 8162, 130-141 (2013).
MSC:  94A60 68M12 68P25
Full Text:

### Authentication protocols for reliable information provision systems with low computational-ability devices. (English)Zbl 1267.68028

MSC:  68M10 94A62 68P25

### Desynchronization attack on RAPP ultralightweight authentication protocol. (English)Zbl 1259.94062

MSC:  94A62 94A60
Full Text:

### Cryptanalytic attacks on MIFARE classic protocol. (English)Zbl 1312.94051

Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 239-258 (2013).
MSC:  94A60
Full Text:

### Applying remote side-channel analysis attacks on a security-enabled NFC tag. (English)Zbl 1312.94065

Dawson, Ed (ed.), Topics in cryptology – CT-RSA 2013. The cryptographers’ track at the RSA conference 2013, San Francisco, CA, USA, February 25–March 1, 2013. Proceedings. Berlin: Springer (ISBN 978-3-642-36094-7/pbk). Lecture Notes in Computer Science 7779, 207-222 (2013).
MSC:  94A60
Full Text:

### The impact of supply chain visibility when lead time is random. (English)Zbl 1260.90012

MSC:  90B05 90B30
Full Text:

### Bayesian estimation in dynamic framed slotted ALOHA algorithm for RFID system. (English)Zbl 1356.94042

MSC:  94A13 62F15
Full Text:

### Compact hardware implementations of the block ciphers mCRYPTON, NOEKEON, and SEA. (English)Zbl 1295.94132

Galbraith, Steven (ed.) et al., Progress in cryptology – INDOCRYPT 2012. 13th international conference on cryptology in India, Kolkata, India, December 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-34930-0/pbk). Lecture Notes in Computer Science 7668, 358-377 (2012).
MSC:  94A60 68P25
Full Text:

### Relations among notions of privacy for RFID authentication protocols. (English)Zbl 1404.94133

Foresti, Sara (ed.) et al., Computer security – ESORICS 2012. 17th European symposium on research in computer security, Pisa, Italy, September 10–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-33166-4/pbk). Lecture Notes in Computer Science 7459, 661-678 (2012).
MSC:  94A62 68P25
Full Text:

### Adaptive impedance matching system for downlink of passive semi-ultra wideband ultra-high frequency radio frequency identification tag. (English)Zbl 1263.93123

MSC:  93C40 93C95 94A12
Full Text:

### Lapin: an efficient authentication protocol based on ring-LPN. (English)Zbl 1282.94078

Canteaut, Anne (ed.), Fast software encryption. 19th international workshop, FSE 2012, Washington, DC, USA, March 19–21, 2012. Revised selected papers. Berlin: Springer (ISBN 978-3-642-34046-8/pbk). Lecture Notes in Computer Science 7549, 346-365 (2012).
MSC:  94A62 68P25
Full Text:

### Comparing improvement strategies for inventory inaccuracy in a two-echelon supply chain. (English)Zbl 1253.90038

MSC:  90B05 91A65
Full Text:

### A heuristic approach for allocation of data to RFID tags: a data allocation knapsack problem (DAKP). (English)Zbl 1251.90017

MSC:  90-08 90C59 90C10
Full Text:

Full Text:

### Metaheuristic traceability attack against SLMAP, an RFID lightweight authentication protocol. (English)Zbl 1259.94063

MSC:  94A62 68T20
Full Text:

### Hierarchical ECC-based RFID authentication protocol. (English)Zbl 1436.94038

Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 183-201 (2012).
MSC:  94A60 94A62
Full Text:

### A scalable RFID authentication protocol supporting ownership transfer and controlled delegation. (English)Zbl 1436.94060

Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 147-162 (2012).
MSC:  94A60
Full Text:

### BUPLE: securing passive RFID communication through physical layer enhancements. (English)Zbl 1436.94045

Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 127-146 (2012).
MSC:  94A60
Full Text:

### An automatic, time-based, secure pairing protocol for passive RFID. (English)Zbl 1436.94028

Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 108-126 (2012).
MSC:  94A60
Full Text:

### Security analysis of two distance-bounding protocols. (English)Zbl 1436.94026

Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 94-107 (2012).
MSC:  94A60
Full Text:

### A novel RFID distance bounding protocol based on physically unclonable functions. (English)Zbl 1436.94072

Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 78-93 (2012).
MSC:  94A60
Full Text:

### Side-channel analysis of cryptographic RFIDs with analog demodulation. (English)Zbl 1436.94073

Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 61-77 (2012).
MSC:  94A60
Full Text:

### Elliptic curve cryptography on the WISP UHF RFID tag. (English)Zbl 1436.94087

Juels, Ari (ed.) et al., RFID. Security and privacy. 7th international workshop, RFIDSec 2011, Amherst, USA, June 26–28, 2011. Revised selected papers. Berlin: Springer. Lect. Notes Comput. Sci. 7055, 32-47 (2012).
MSC:  94A60
Full Text:

### A pre-computable signature scheme with efficient verification for RFID. (English)Zbl 1292.68052

Ryan, Mark D. (ed.) et al., Information security practice and experience. 8th international conference, ISPEC 2012, Hangzhou, China, April 9–12, 2012. Proceedings. Berlin: Springer (ISBN 978-3-642-29100-5/pbk). Lecture Notes in Computer Science 7232, 1-16 (2012).
MSC:  68P25 94A60 94A62
Full Text:

### Private identification of RFID tags. (English)Zbl 1302.94056

Garcia-Alfaro, Joaquin (ed.) et al., Foundations and practice of security. 4th Canada-France MITACS workshop, FPS 2011, Paris, France, May 12–13, 2011. Revised selected papers. Berlin: Springer (ISBN 978-3-642-27900-3/pbk). Lecture Notes in Computer Science 6888, 49-61 (2012).
MSC:  94A60 68P25
Full Text:

### Localization privacy. (English)Zbl 1300.94043

Naccache, David (ed.), Cryptography and security: From theory to applications. Essays dedicated to Jean-Jacques Quisquater on the occasion of his 65th birthday. Berlin: Springer (ISBN 978-3-642-28367-3/pbk). Lecture Notes in Computer Science 6805, 425-441 (2012).
MSC:  94A60
Full Text:

### ACSP: A novel security protocol against counting attack for UHF RFID systems. (English)Zbl 1354.94045

MSC:  94A60 68P30
Full Text:

### Research on solutions for preventing algebraic attacks against biometric and RFID protocols. (English)Zbl 1340.68010

MSC:  68M12 94A60 94A62

### Comments on enhanced yoking proof protocols for radio frequency identification tags and tag groups. (English)Zbl 1312.94112

MSC:  94A62 94A60
Full Text:

### Object tracking and tracing: hidden semi-Markov model based probabilistic location determination. (English)Zbl 1294.68131

MSC:  68T20 62H12 62F10
Full Text:

### Environmental affection based RFID potential bio-disease tracking/tracing system. (English)Zbl 1279.93075

MSC:  93C83 92B99
Full Text:

### EPCBC – a block cipher suitable for electronic product code encryption. (English)Zbl 1307.94111

Lin, Dongdai (ed.) et al., Cryptology and network security. 10th international conference, CANS 2011, Sanya, China, December 10–12, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25512-0/pbk). Lecture Notes in Computer Science 7092, 76-97 (2011).
MSC:  94A60
Full Text:

### Addressing flaws in RFID authentication protocols. (English)Zbl 1291.94187

Bernstein, Daniel J. (ed.) et al., Progress in cryptology – INDOCRYPT 2011. 12th international conference on cryptology in India, Chennai, India, December 11–14, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-25577-9/pbk). Lecture Notes in Computer Science 7107, 216-235 (2011).
MSC:  94A62 68P25
Full Text:

### Passive cryptanalysis of the unconditionally secure authentication protocol for RFID systems. (English)Zbl 1297.94121

Rhee, Kyung-Hyune (ed.) et al., Information security and cryptology – ICISC 2010. 13th international conference, Seoul, Korea, December 1–3, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-24208-3/pbk). Lecture Notes in Computer Science 6829, 92-103 (2011).
MSC:  94A62 68P25
Full Text:

### The LED block cipher. (English)Zbl 1291.94092

Preneel, Bart (ed.) et al., Cryptographic hardware and embedded systems – CHES 2011. 13th international workshop, Nara, Japan, September 28–October 1, 2011. Proceedings. Berlin: Springer (ISBN 978-3-642-23950-2/pbk). Lecture Notes in Computer Science 6917, 326-341 (2011).
MSC:  94A60 68P25
Full Text:

### Quasi-linear cryptanalysis of a secure RFID ultralightweight authentication protocol. (English)Zbl 1295.94188

Lai, Xuejia (ed.) et al., Information security and cryptology. 6th international conference, Inscrypt 2010, Shanghai, China, October 20–24, 2010. Revised selected papers. Berlin: Springer (ISBN 978-3-642-21517-9/pbk). Lecture Notes in Computer Science 6584, 427-442 (2011).
MSC:  94A62 94A60
Full Text:

MSC:  94A62
Full Text:

### RFID authentication efficient proactive information security within computational security. (English)Zbl 1208.94055

MSC:  94A62 94A60 68M12
Full Text:

all top 5

all top 5

all top 3

all top 3