共 50 条
- [31] A Mutual RFID Security Protocol for Wireless Reader INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (05): : 43 - 52
- [32] An Authentication Protocol Applied to RFID Security Systems FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 307 - +
- [33] AES Algorithm Applied on Security Protocol of RFID 3RD AASRI CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND BIOINFORMATICS (CIB 2015), 2015, : 1 - 5
- [34] Security flaws in a recent RFID delegation protocol Personal and Ubiquitous Computing, 2012, 16 : 337 - 349
- [37] On the Security of an ECC Based RFID Authentication Protocol 2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 111 - 114
- [38] Hierarchical RFID Tag Ownership and Transfer in Supply Chains E-LIFE: WEB-ENABLED CONVERGENCE OF COMMERCE, WORK, AND SOCIAL LIFE, 2012, 108 : 390 - 398
- [40] Computational Model for Trust Management in RFID Supply Chains 2009 IEEE 6TH INTERNATIONAL CONFERENCE ON MOBILE ADHOC AND SENSOR SYSTEMS (MASS 2009), 2009, : 965 - 971