Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols

Chao Lv, Hui Li, Jianfeng Ma, Yaoyu Zhang. Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols. European Transactions on Telecommunications, 23(7):618-624, 2012. [doi]

@article{LvLMZ12,
  title = {Vulnerability analysis of elliptic curve cryptography-based RFID authentication protocols},
  author = {Chao Lv and Hui Li and Jianfeng Ma and Yaoyu Zhang},
  year = {2012},
  doi = {10.1002/ett.2514},
  url = {http://dx.doi.org/10.1002/ett.2514},
  researchr = {https://researchr.org/publication/LvLMZ12},
  cites = {0},
  citedby = {0},
  journal = {European Transactions on Telecommunications},
  volume = {23},
  number = {7},
  pages = {618-624},
}