Date: 2012-06-09 07:48:21Ubiquitous computing Wireless N1 road XTR Technology Telecommunications engineering Finite fields Automatic identification and data capture Radio-frequency identification | | Security Analysis of RAPP: An RFID Authentication Protocol based on Permutation Wang Shao-hui1,2,3, Han Zhijie1,2, Liu Sujuan1,2, Chen Dan-wei1,2 {1.College of Computer, Nanjing University of Posts and TelecommunicationsAdd to Reading ListSource URL: eprint.iacr.orgDownload Document from Source Website File Size: 167,43 KBShare Document on Facebook
|