共 50 条
- [21] Review on RFID Identity Authentication Protocols Based on Hash Function [J]. 2017 INTERNATIONAL CONFERENCE ON COMPUTER NETWORK, ELECTRONIC AND AUTOMATION (ICCNEA), 2017, : 20 - 27
- [22] Analytic Hierarchy Process Based Compatibility Measurement for RFID Protocols [J]. 2022 18TH INTERNATIONAL CONFERENCE ON MOBILITY, SENSING AND NETWORKING, MSN, 2022, : 708 - 712
- [23] Comparison of transmission schemes for framed ALOHA based RFID protocols [J]. INTERNATIONAL SYMPOSIUM ON APPLICATIONS AND THE INTERNET WORKSHOPS, PROCEEDINGS, 2006, : 92 - 95
- [24] Bayesian transmission strategy for framed ALOHA based RFID Protocols [J]. 2007 IEEE INTERNATIONAL CONFERENCE ON RFID, 2007, : 177 - 184
- [27] Bayesian transmission strategy for framed ALOHA based RFID protocols [J]. 2006 INTERNATIONAL SYMPOSIUM ON INDUSTRIAL EMBEDDED SYSTEMS, 2006, : 228 - 235
- [28] A Security and Performance Evaluation of Hash-Based RFID Protocols [J]. INFORMATION SECURITY AND CRYPTOLOGY, 2009, 5487 : 406 - +
- [29] Random Graph Based Benchmarking Methodology for RFID Security Protocols [J]. 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2013, : 184 - 191
- [30] Simulation-Based Traceability Analysis of RFID Authentication Protocols [J]. Wireless Personal Communications, 2014, 77 : 1019 - 1038