共 50 条
- [2] Untraceability of RFID protocols [J]. INFORMATION SECURITY THEORY AND PRACTICES: SMART DEVICES, CONVERGENCE AND NEXT GENERATION NETWORKS, 2008, 5019 : 1 - 15
- [3] Security analysis of two lightweight RFID authentication protocols [J]. annals of telecommunications - annales des télécommunications, 2014, 69 : 273 - 282
- [4] Security Analysis and Improvement on Two RFID Authentication Protocols [J]. Wireless Personal Communications, 2015, 82 : 21 - 33
- [5] Security analysis of two lightweight RFID authentication protocols [J]. ANNALS OF TELECOMMUNICATIONS-ANNALES DES TELECOMMUNICATIONS, 2014, 69 (5-6): : 273 - 282
- [7] Weaknesses in Two RFID Authentication Protocols [J]. CODES, CRYPTOLOGY, AND INFORMATION SECURITY, C2SI 2015, 2015, 9084 : 162 - 172
- [8] Security analysis of two recently proposed RFID authentication protocols [J]. FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2011, 5 (03): : 335 - 340
- [10] Privacy Analysis and Improvements of Two Recent RFID Authentication Protocols [J]. 2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 137 - 142