Security enhancement of the authenticated RFID security mechanism based on chaotic maps

  • RFID security enhancement based on chaotic maps
  • Mustapha Benssalah, Mustapha Djeddou, Karim Drouiche
  • Security and Communication Networks, January 2014, Wiley
  • DOI: 10.1002/sec.946

The authors haven't finished explaining this publication. If you are the author, sign in to claim or explain your work.

Read Publication

http://dx.doi.org/10.1002/sec.946

The following have contributed to this page: djeddou Mustapha

In partnership with:

Link to Wiley showcase