Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols

Chao Lv, Hui Li, Jianfeng Ma, Yaoyu Zhang. Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols. European Transactions on Telecommunications, 23(7):618-624, 2012. [doi]

Authors

Chao Lv

This author has not been identified. Look up 'Chao Lv' in Google

Hui Li

This author has not been identified. Look up 'Hui Li' in Google

Jianfeng Ma

This author has not been identified. Look up 'Jianfeng Ma' in Google

Yaoyu Zhang

This author has not been identified. Look up 'Yaoyu Zhang' in Google