Optimal Key-Tree for RFID Authentication Protocols with Storage Constraints

Shao-hui Wang, Yan-Xuan Zhang, Changbo Ke, Fu Xiao, Ruchuan Wang. Optimal Key-Tree for RFID Authentication Protocols with Storage Constraints. In Feng Liu 0001, Jia Xu 0003, Shouhuai Xu, Moti Yung, editors, Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers. Volume 11933 of Lecture Notes in Computer Science, pages 278-292, Springer, 2019. [doi]

@inproceedings{WangZKXW19,
  title = {Optimal Key-Tree for RFID Authentication Protocols with Storage Constraints},
  author = {Shao-hui Wang and Yan-Xuan Zhang and Changbo Ke and Fu Xiao and Ruchuan Wang},
  year = {2019},
  doi = {10.1007/978-3-030-34637-9_21},
  url = {https://doi.org/10.1007/978-3-030-34637-9_21},
  researchr = {https://researchr.org/publication/WangZKXW19},
  cites = {0},
  citedby = {0},
  pages = {278-292},
  booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers},
  editor = {Feng Liu 0001 and Jia Xu 0003 and Shouhuai Xu and Moti Yung},
  volume = {11933},
  series = {Lecture Notes in Computer Science},
  publisher = {Springer},
  isbn = {978-3-030-34637-9},
}