共 50 条
- [21] Authentication Protocol of RFID System Based on Security Policy 2013 THIRD INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2013, : 1242 - 1246
- [22] An Effective RFID Security Protocol Based on Secret Sharing PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 780 - 784
- [25] Application of chaotic encryption algorithm based on variable parameters in RFID security EURASIP Journal on Wireless Communications and Networking, 2021
- [26] On Modeling Protocol-Based Clustering Tag in RFID Systems with Formal Security Analysis 2015 IEEE 29TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (IEEE AINA 2015), 2015, : 498 - 505
- [29] Security and privacy analysis of RFID authentication protocol for ubiquitous computing PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 1359 - +
- [30] Simulation based analysis of RFID Protocol PROCEEDINGS OF THE 2016 IEEE INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, SIGNAL PROCESSING AND NETWORKING (WISPNET), 2016, : 1894 - 1897