RFID Security Protocol Based On Cryptographic Hash Function. Trinity Journal of Management, IT & Media (TJMITM), [S. l.], v. 8, n. 1, p. 68–71, 2017. Disponível em: https://acspublisher.com/journals/index.php/tjmitm/article/view/461.. Acesso em: 22 jul. 2024.