共 50 条
- [21] Security analysis of two anonymous authentication protocols for distributed wireless networks Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 284 - 288
- [22] Security analysis of two ultra-lightweight RFID authentication protocols NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 109 - +
- [23] Security Analysis of Standard Authentication and Key Agreement Protocols Utilising Timestamps PROGRESS IN CRYPTOLOGY - AFRICACRYPT 2009, 2009, 5580 : 235 - 253
- [24] Limitations of Authentication Test in the Analysis of Multi-party Security Protocols PROCEEDINGS 2013 INTERNATIONAL CONFERENCE ON MECHATRONIC SCIENCES, ELECTRIC ENGINEERING AND COMPUTER (MEC), 2013, : 2243 - 2247
- [25] Security Verification for Authentication and Key Exchange Protocols INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (03): : 1 - 11
- [28] Security Issues in Ultralightweight RFID Authentication Protocols Wireless Personal Communications, 2018, 98 : 779 - 814
- [30] More on the Security of Linear RFID Authentication Protocols SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5867 : 182 - 196