Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols

Chao Lv, Hui Li, Jianfeng Ma, Yaoyu Zhang. Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols. European Transactions on Telecommunications, 23(7):618-624, 2012. [doi]

Abstract

Abstract is missing.