Wang Xiao-hua

  • Citations Per Year
Learn More
RFID systems, owning to their low cost and conveniences in identifying, have been applied in many fields. But the features of RFID system and the constraints of RFID devices may bring about various security problems. In this paper, firstly we analyze Hash-Lock protocol and its patulous protocols. Based on the analysis, we propose an improved security(More)
  • 1