Author:
Aghili Seyed Farhad,Mala Hamid,Kaliyar Pallavi,Conti Mauro
Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference45 articles.
1. A scalable dual-field elliptic curve cryptographic processor;Satoh;IEEE Trans. Comput.,2003
2. RFID Security without extensive cryptography;Karthikeyan,2005
3. Lightweight RFID protocol for medical privacy protection in IoT;Fan;IEEE Trans. Ind. Inf.,2018
4. Secure human identification protocols;Hopper,2001
5. Authenticating pervasive devices with human protocols;Juels,2005
Cited by
74 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献