Vulnerabilities of RFID Security Protocol Based on Chaotic Maps
2013 ◽
Vol 17
(4)
◽
pp. 805-807
◽
2013 ◽
Vol 6
(2)
◽
pp. 247-256
◽
2018 ◽
Vol 16
(10)
◽
pp. 119-123
2014 ◽
Vol 7
(12)
◽
pp. 2356-2372
◽