共 50 条
- [31] Security Verification for Authentication and Key Exchange Protocols [J]. 2008 INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY AND ITS APPLICATIONS, VOLS 1-3, 2008, : 507 - 512
- [32] Scalability and Security Conflict for RFID Authentication Protocols [J]. Wireless Personal Communications, 2011, 59 : 43 - 56
- [33] Overview security analysis of 3G authentication protocols and technical specifications [J]. Qinghua Daxue Xuebao/Journal of Tsinghua University, 2009, 49 (SUPPL. 2): : 2193 - 2199
- [34] Authentication Tests Based on Distributed Temporal Protocol Logic for the Analysis of Security Protocols [J]. INFORMATICS ENGINEERING AND INFORMATION SCIENCE, PT I, 2011, 251 : 214 - 228
- [37] Security of public key certificate based authentication protocols [J]. PUBLIC KEY CRYTOGRAPHY, 2000, 1751 : 196 - 209
- [38] Compositional analysis of authentication protocols [J]. PROGRAMMING LANGUAGES AND SYSTEMS, 2004, 2986 : 140 - 154
- [39] A review of authentication protocols for rfid security on smart healthcare [J]. TARUMANAGARA INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF TECHNOLOGY AND ENGINEERING, 2019, 508
- [40] RFID Mutual Authentication Protocols with Universally Composable Security [J]. RADIO FREQUENCY IDENTIFICATION SYSTEM SECURITY (RFIDSEC'11), 2011, 6 : 35 - 49