Sign Up to like & get
recommendations!
2
Published in 2023 at "IEEE Access"
DOI: 10.1109/access.2023.3269571
Abstract: RFID tags are prone to counterfeit attacks in supply chain scenarios. The attacker often uses counterfeit tags to replace stolen tags to avoid being detected by the inventory process. To defend against such attacks, existing…
read more here.
Keywords:
rfid tags;
slot;
fast counterfeit;
detection ... See more keywords