Comparison of Attacks and Security Analyses for Different RFID Protocols

Jung-Tae Kim. Comparison of Attacks and Security Analyses for Different RFID Protocols. In Kuinam J. Kim, Kyung-Yong Chung, editors, Proceedings of the International Conference on IT Convergence and Security, ICITCS 2012, Pyeong Chang, Korea, December 5-7, 2012. Volume 215 of Lecture Notes in Electrical Engineering, pages 189-196, Springer, 2012. [doi]

@inproceedings{Kim12-28,
  title = {Comparison of Attacks and Security Analyses for Different RFID Protocols},
  author = {Jung-Tae Kim},
  year = {2012},
  doi = {10.1007/978-94-007-5860-5_22},
  url = {http://dx.doi.org/10.1007/978-94-007-5860-5_22},
  researchr = {https://researchr.org/publication/Kim12-28},
  cites = {0},
  citedby = {0},
  pages = {189-196},
  booktitle = {Proceedings of the International Conference on IT Convergence and Security, ICITCS 2012, Pyeong Chang, Korea, December 5-7, 2012},
  editor = {Kuinam J. Kim and Kyung-Yong Chung},
  volume = {215},
  series = {Lecture Notes in Electrical Engineering},
  publisher = {Springer},
  isbn = {978-94-007-5859-9},
}