School of Electronic & Electrical Engineering, Shanghai University of Engineering Science, Shanghai, China
School of Electronic & Electrical Engineering, Shanghai University of Engineering Science, Shanghai, China
School of Electronic & Electrical Engineering, Shanghai University of Engineering Science, Shanghai, China
School of Electronic & Electrical Engineering, Shanghai University of Engineering Science, Shanghai, China
Copyright © 2016 Zhicai Shi, Shitao Ren, Fei Wu, Changzhi Wang et al. This is
an open access article distributed under the Creative Commons Attribution
License, which permits unrestricted use, distribution, and reproduction in any
medium, provided the original work is properly cited.
How to Cite this Article
Shi, Z. , Ren, S. , Wu, F. and Wang, C. (2016) The Vulnerability Analysis of Some Typical Hash-Based RFID Authentication Protocols.
Journal of Computer and Communications,
4, 1-9. doi:
10.4236/jcc.2016.48001.