Shao-hui Wang, Yan-Xuan Zhang, Changbo Ke, Fu Xiao, Ruchuan Wang. Optimal Key-Tree for RFID Authentication Protocols with Storage Constraints. In Feng Liu 0001, Jia Xu 0003, Shouhuai Xu, Moti Yung, editors, Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers. Volume 11933 of Lecture Notes in Computer Science, pages 278-292, Springer, 2019. [doi]
@inproceedings{WangZKXW19, title = {Optimal Key-Tree for RFID Authentication Protocols with Storage Constraints}, author = {Shao-hui Wang and Yan-Xuan Zhang and Changbo Ke and Fu Xiao and Ruchuan Wang}, year = {2019}, doi = {10.1007/978-3-030-34637-9_21}, url = {https://doi.org/10.1007/978-3-030-34637-9_21}, researchr = {https://researchr.org/publication/WangZKXW19}, cites = {0}, citedby = {0}, pages = {278-292}, booktitle = {Science of Cyber Security - Second International Conference, SciSec 2019, Nanjing, China, August 9-11, 2019, Revised Selected Papers}, editor = {Feng Liu 0001 and Jia Xu 0003 and Shouhuai Xu and Moti Yung}, volume = {11933}, series = {Lecture Notes in Computer Science}, publisher = {Springer}, isbn = {978-3-030-34637-9}, }