

Publisher: John Wiley & Sons Inc
E-ISSN: 1099-1131|31|4|dac.3484-dac.3484
ISSN: 1074-5351
Source: INTERNATIONAL JOURNAL OF COMMUNICATION SYSTEMS (ELECTRONIC), Vol.31, Iss.4, 2018-03, pp. : n/a-n/a
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Previous Menu Next
Abstract
Related content


Vulnerabilities of an ECC‐based RFID authentication scheme
SECURITY AND COMMUNICATION NETWORKS (ELECTRONIC), Vol. 8, Iss. 17, 2015-11 ,pp. :





