Report copyright - Authenticating Pervasive Devices with Human Protocolspervasive computing, RFID 1 Introduction As low-cost computing devices become more pervasive, counterfeiting may be-come amore
Please pass captcha verification before submit form