[1]
N. Dinarvand and H. Barati, “A Survey and Comparing RFID Authentication Protocols Based on Elliptic Curve Cryptography”, MJTD, vol. 5, no. 1, Mar. 2016.