z-logo
open-access-imgOpen Access
Research on RFID Security Authentication Protocol Based on HASH Function
Author(s) -
Zhen-huan Chen,
Xue-feng Pan
Publication year - 2018
Publication title -
destech transactions on engineering and technology research
Language(s) - English
Resource type - Journals
ISSN - 2475-885X
DOI - 10.12783/dtetr/ecar2018/26353
Subject(s) - replay attack , computer science , eavesdropping , hash function , computer security , challenge–response authentication , authentication protocol , authentication (law) , protocol (science) , overhead (engineering) , transmission (telecommunications) , otway–rees protocol , process (computing) , hash chain , computer network , challenge handshake authentication protocol , telecommunications , operating system , medicine , alternative medicine , pathology

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here