Keywords = RFID
Number of Articles: 3
2. On the Security of Permutation Based Authentication Protocols for Internet of Things Applications: The Case of Huang et al.'s Protocol

Volume 3, Issue 4, Autumn 2016, Pages 201-209

Samad Rostampour; Nasour Bagheri; Mehdi Hosseinzadeh; Ahmad Khademzadeh


3. Security Analysis of an EPC Class-1 Generation-2 Compliant RFID Authentication Protocol

Volume 3, Issue 3, Summer 2016, Pages 163-174

Fereidoun Moradi; Hamid Mala; Behrouz Tork Ladani; Fariba Moradi