共 50 条
- [41] RFID Bi-directional Authentication Protocol Based on Random Number and Hash Function PROCEEDINGS OF THE 2015 3RD INTERNATIONAL CONFERENCE ON MACHINERY, MATERIALS AND INFORMATION TECHNOLOGY APPLICATIONS, 2015, 35 : 919 - 922
- [42] Proposing and verifying a security protocol for hash function-based IoT communication system Cluster Computing, 2016, 19 : 497 - 504
- [43] Proposing and verifying a security protocol for hash function-based IoT communication system CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2016, 19 (01): : 497 - 504
- [45] Hash function and DSRC based secure communication protocol for VANET-WAVE architecture JOURNAL OF DISCRETE MATHEMATICAL SCIENCES & CRYPTOGRAPHY, 2023, 26 (03): : 829 - 839
- [46] Internal differential collision attacks on the reduced-round Grøstl-0 hash function Designs, Codes and Cryptography, 2014, 70 : 251 - 271
- [48] RFID mutual-authentication protocol with synchronous updated-keys based on Hash function J. China Univ. Post Telecom., 6 (27-35):
- [49] Low-cost Authentication Protocol of RFID System Using One Block Hash Function 2011 6TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCES AND CONVERGENCE INFORMATION TECHNOLOGY (ICCIT), 2012, : 671 - 676