共 50 条
- [21] RFID Security Certification based on the Internet of Things 2016 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION SECURITY (CSIS 2016), 2016, : 755 - 760
- [22] RFID Bi-directional Authentication Protocol Based on Random Number and Hash Function PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 919 - 922
- [24] Hash-based RFID Mutual Authentication Protocol INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 183 - 194
- [25] AES Algorithm Applied on Security Protocol of RFID 3RD AASRI CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND BIOINFORMATICS (CIB 2015), 2015, : 1 - 5
- [26] A New RFID Secure Authentication Protocol Based on Hash PROCEEDINGS OF THE 14TH YOUTH CONFERENCE ON COMMUNICATION, 2009, : 429 - 432
- [27] Research of New Index Generation Algorithm Based on Hash Function PROCEEDINGS OF 2013 IEEE 4TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING AND SERVICE SCIENCE (ICSESS), 2012, : 799 - 802
- [28] Hash-based RFID security protocol using randomly key-changed identification procedure COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 296 - 305
- [29] Slot Assignment Algorithm Based on Hash Function for Multi-target RFID System 2018 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC), 2018, : 583 - 587
- [30] RFID mutual-authentication protocol with synchronous updated-keys based on Hash function J. China Univ. Post Telecom., 6 (27-35):