Vulnerabilities of RFID Security Protocol Based on Chaotic Maps

Author(s):  
Mete Akgun ◽  
Tubitak Uekae ◽  
M. Ufuk Caglayan
2013 ◽  
Vol 17 (4) ◽  
pp. 805-807 ◽  
Author(s):  
Nasour Bagheri ◽  
Masoumeh Safkhani ◽  
Pedro Peris-Lopez ◽  
Juan E. Tapiador

Author(s):  
Xin Gao ◽  
Shengqi Lv ◽  
Hao Zhang ◽  
Xingpeng Li ◽  
Weijia Ji ◽  
...  

2013 ◽  
Vol 6 (2) ◽  
pp. 247-256 ◽  
Author(s):  
Zi-Yao Cheng ◽  
Yun Liu ◽  
Chin-Chen Chang ◽  
Shih-Chang Chang

2014 ◽  
Vol 7 (12) ◽  
pp. 2356-2372 ◽  
Author(s):  
Mustapha Benssalah ◽  
Mustapha Djeddou ◽  
Karim Drouiche

Sign in / Sign up

Export Citation Format

Share Document