![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
Research Home
Tools Art & Architecture Thesaurus Source Record
|
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![Art & Architecture Thesaurus Source Record](/research/tools/vocabularies/images/header_aat_source.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![Previous Page](/research/tools/vocabularies/images/previous_page.gif) |
![Help](/global/images/global_help.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
Source ID: 2000109151
|
Brief Citation: Lehtonen, et al, From Identification to Authentication (2008)
|
Full Citation: Lehtonen, M., T. Staake, F. Michahelles. "From identification to authentication–a review of RFID product authentication techniques." Networked RFID Systems and Lightweight Cryptography (2008): 169-187.
|
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![](/global/images/ghost.gif) |
![New Search](/global/images/global_new_search.gif) |
|