共 50 条
- [2] Research on a provable security RFID authentication protocol based on Hash function Yinhui, Yu (yuyh@jlu.edu.cn), 2016, Beijing University of Posts and Telecommunications (23):
- [3] Research on RFID Security Authentication Protocol Based on HASH Function 2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 251 - 255
- [4] A Security RFID Authentication Protocol Based on Hash Function IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 804 - 807
- [5] An Improvement RFID Security Authentication Protocol Based on Hash Function INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 375 - 384
- [6] Research on hash-based RFID security authentication protocol Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2009, 46 (04): : 583 - 592
- [7] Research on Hash-Based low-cost RFID Security Authentication Protocol ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1524 - 1530
- [8] Mobile RFID Mutual Authentication Protocol Based on Hash Function 2017 INTERNATIONAL CONFERENCE ON CYBER-ENABLED DISTRIBUTED COMPUTING AND KNOWLEDGE DISCOVERY (CYBERC), 2017, : 358 - 361
- [9] Research of RFID certification security protocol based on hash function and DES algorithm 1600, Academy Publisher (08):
- [10] Forward private RFID authentication protocol based on universal hash function Gao, S. (shujing_g@126.com), 1600, Binary Information Press, Flat F 8th Floor, Block 3, Tanner Garden, 18 Tanner Road, Hong Kong (10):