共 50 条
- [1] Traceability Analysis of Recent RFID Authentication Protocols [J]. Wireless Personal Communications, 2015, 83 : 1663 - 1682
- [2] Simulation-Based Traceability Analysis of RFID Authentication Protocols [J]. Wireless Personal Communications, 2014, 77 : 1019 - 1038
- [4] On the Traceability of Tags in SUAP RFID Authentication Protocols [J]. 2012 IEEE INTERNATIONAL CONFERENCE ON RFID-TECHNOLOGIES AND APPLICATIONS (RFID-TA), 2012,
- [5] Traceability Analysis of Quadratic Residue-Based RFID Authentication Protocols [J]. 2013 ELEVENTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST (PST), 2013, : 61 - 68
- [6] Attacks on Recent RFID Authentication Protocols [J]. Journal of Signal Processing Systems, 2015, 79 : 271 - 283
- [7] Attacks on Recent RFID Authentication Protocols [J]. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2015, 79 (03): : 271 - 283
- [8] Privacy of recent RFID authentication protocols [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2008, 4991 : 263 - +
- [9] Privacy Analysis and Improvements of Two Recent RFID Authentication Protocols [J]. 2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 137 - 142
- [10] Weaknesses in Two Recent Lightweight RFID Authentication Protocols [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2010, 6151 : 383 - +