How to solve collision and authentication issues using RFID protocol technology. Jeng, A. B., Chang, L., Lee, H., Wei, T., & Lin, S. In ICMLC, pages 454-460, 2011. IEEE.
Link
Paper bibtex @inproceedings{conf/icmlc/JengCLWL11,
added-at = {2017-05-21T00:00:00.000+0200},
author = {Jeng, Albert B. and Chang, Li-Chung and Lee, Hahn-Ming and Wei, Te-En and Lin, Szu-Yu},
biburl = {https://www.bibsonomy.org/bibtex/22dcf789677c6372cbd4055a0fe857af4/dblp},
booktitle = {ICMLC},
crossref = {conf/icmlc/2011},
ee = {https://doi.org/10.1109/ICMLC.2011.6016689},
interhash = {1c0d6cbc9c7dbee97b8a5477e492380d},
intrahash = {2dcf789677c6372cbd4055a0fe857af4},
isbn = {978-1-4577-0305-8},
keywords = {dblp},
pages = {454-460},
publisher = {IEEE},
timestamp = {2017-05-24T08:12:06.000+0200},
title = {How to solve collision and authentication issues using RFID protocol technology.},
url = {http://dblp.uni-trier.de/db/conf/icmlc/icmlc2011.html#JengCLWL11},
year = 2011
}
Downloads: 0
{"_id":"NfR8g5GvJ9foeSzSk","bibbaseid":"jeng-chang-lee-wei-lin-howtosolvecollisionandauthenticationissuesusingrfidprotocoltechnology-2011","authorIDs":[],"author_short":["Jeng, A. B.","Chang, L.","Lee, H.","Wei, T.","Lin, S."],"bibdata":{"bibtype":"inproceedings","type":"inproceedings","added-at":"2017-05-21T00:00:00.000+0200","author":[{"propositions":[],"lastnames":["Jeng"],"firstnames":["Albert","B."],"suffixes":[]},{"propositions":[],"lastnames":["Chang"],"firstnames":["Li-Chung"],"suffixes":[]},{"propositions":[],"lastnames":["Lee"],"firstnames":["Hahn-Ming"],"suffixes":[]},{"propositions":[],"lastnames":["Wei"],"firstnames":["Te-En"],"suffixes":[]},{"propositions":[],"lastnames":["Lin"],"firstnames":["Szu-Yu"],"suffixes":[]}],"biburl":"https://www.bibsonomy.org/bibtex/22dcf789677c6372cbd4055a0fe857af4/dblp","booktitle":"ICMLC","crossref":"conf/icmlc/2011","ee":"https://doi.org/10.1109/ICMLC.2011.6016689","interhash":"1c0d6cbc9c7dbee97b8a5477e492380d","intrahash":"2dcf789677c6372cbd4055a0fe857af4","isbn":"978-1-4577-0305-8","keywords":"dblp","pages":"454-460","publisher":"IEEE","timestamp":"2017-05-24T08:12:06.000+0200","title":"How to solve collision and authentication issues using RFID protocol technology.","url":"http://dblp.uni-trier.de/db/conf/icmlc/icmlc2011.html#JengCLWL11","year":"2011","bibtex":"@inproceedings{conf/icmlc/JengCLWL11,\n added-at = {2017-05-21T00:00:00.000+0200},\n author = {Jeng, Albert B. and Chang, Li-Chung and Lee, Hahn-Ming and Wei, Te-En and Lin, Szu-Yu},\n biburl = {https://www.bibsonomy.org/bibtex/22dcf789677c6372cbd4055a0fe857af4/dblp},\n booktitle = {ICMLC},\n crossref = {conf/icmlc/2011},\n ee = {https://doi.org/10.1109/ICMLC.2011.6016689},\n interhash = {1c0d6cbc9c7dbee97b8a5477e492380d},\n intrahash = {2dcf789677c6372cbd4055a0fe857af4},\n isbn = {978-1-4577-0305-8},\n keywords = {dblp},\n pages = {454-460},\n publisher = {IEEE},\n timestamp = {2017-05-24T08:12:06.000+0200},\n title = {How to solve collision and authentication issues using RFID protocol technology.},\n url = {http://dblp.uni-trier.de/db/conf/icmlc/icmlc2011.html#JengCLWL11},\n year = 2011\n}\n\n","author_short":["Jeng, A. B.","Chang, L.","Lee, H.","Wei, T.","Lin, S."],"key":"conf/icmlc/JengCLWL11","id":"conf/icmlc/JengCLWL11","bibbaseid":"jeng-chang-lee-wei-lin-howtosolvecollisionandauthenticationissuesusingrfidprotocoltechnology-2011","role":"author","urls":{"Link":"https://doi.org/10.1109/ICMLC.2011.6016689","Paper":"http://dblp.uni-trier.de/db/conf/icmlc/icmlc2011.html#JengCLWL11"},"keyword":["dblp"],"downloads":0},"bibtype":"inproceedings","biburl":"http://www.bibsonomy.org/bib/author/Chang Li?items=1000","creationDate":"2020-03-18T03:31:20.825Z","downloads":0,"keywords":["dblp"],"search_terms":["solve","collision","authentication","issues","using","rfid","protocol","technology","jeng","chang","lee","wei","lin"],"title":"How to solve collision and authentication issues using RFID protocol technology.","year":2011,"dataSources":["csw6JBpYFS5SMxH93"]}