Survivable RFID systems: issues, challenges, and techniques
IEEE Transactions on Systems, Man, and Cybernetics, Part C: Applications and Reviews
Security analysis of two recently proposed RFID authentication protocols
Frontiers of Computer Science in China
An RFID Based Multi-batch Supply Chain Systems
Wireless Personal Communications: An International Journal
Secure and practical threshold RSA
Proceedings of the 6th International Conference on Security of Information and Networks
Hi-index | 0.00 |
Crosscutting behaviors and features of architectural units have always been a tricky issue in software architecture design. If not well treated, they may cause some unnecessary coupling among architectural units and hamper maintenance, evolution and ...