共 50 条
- [21] Location Privacy of Distance Bounding Protocols CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2008, : 149 - 159
- [22] Distance bounding protocols for RFID enhanced by using void-challenges and analysis in noisy channels WIRELESS COMMUNICATIONS & MOBILE COMPUTING, 2008, 8 (09): : 1227 - 1232
- [23] Bounding messages for free in security protocols FSTTCS 2007: FOUNDATIONS OF SOFTWARE TECHNOLOGY AND THEORETICAL COMPUTER SCIENCE, PROCEEDINGS, 2007, 4855 : 376 - 387
- [24] On the Security of RFID Authentication Protocols 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT), 2015,
- [28] The outer limits of RFID security CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2006, PROCEEDINGS, 2006, 4249 : 231 - 231
- [29] The Swiss-Knife RFID Distance Bounding Protocol INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2008, 2009, 5461 : 98 - 115
- [30] Distance Bounding Protocol for Multiple RFID Tag Authentication EUC 2008: PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON EMBEDDED AND UBIQUITOUS COMPUTING, VOL 2, WORKSHOPS, 2008, : 115 - 120