RFID Security Protocol Based On Cryptographic Hash Function. (2017). Trinity Journal of Management, IT & Media (TJMITM), 8(1), 68–71. Retrieved from https://acspublisher.com/journals/index.php/tjmitm/article/view/461