共 50 条
- [1] A Security Protocol Resistant to Intermittent Position Trace Attacks and Desynchronization Attacks in RFID Systems [J]. Wireless Personal Communications, 2013, 68 : 1943 - 1959
- [2] Data desynchronization attacks on RFID security protocols [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2013, 41 (04): : 65 - 69
- [3] An efficient authentication protocol for RFID systems resistant to active attacks [J]. EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 781 - 794
- [4] Data Desynchronization Attacks on two Lightweight Security Protocols for the RFID System [J]. INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS, PTS 1-4, 2013, 241-244 : 2331 - +
- [5] Classification of major security attacks against RFID systems [J]. 2017 INTERNATIONAL CONFERENCE ON WIRELESS TECHNOLOGIES, EMBEDDED AND INTELLIGENT SYSTEMS (WITS), 2017,
- [6] Security Analysis of RFID Relay Attacks [J]. JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (02): : 191 - 196
- [7] Investigating attacks to improve security and privacy in RFID systems using the security bit method [J]. 2019 IEEE 5TH CONFERENCE ON KNOWLEDGE BASED ENGINEERING AND INNOVATION (KBEI 2019), 2019, : 833 - 838
- [9] Attacks and Improvements to a New RFID Authentication Protocol [J]. RADIO FREQUENCY IDENTIFICATION SYSTEM SECURITY (RFIDSEC'11), 2011, 6 : 66 - 80
- [10] Two Attacks against the Ff RFID Protocol [J]. PROGRESS IN CRYPTOLOGY - INDOCRYPT 2009, PROCEEDINGS, 2009, 5922 : 308 - +