1.
RFID Security Protocol Based On Cryptographic Hash Function. tjmitm. 2017;8(1):68-71. Accessed May 5, 2025. https://journals.acspublisher.com/index.php/tjmitm/article/view/461