共 50 条
- [32] Theoretical Analysis of RFID Security Protocols 2014 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2014, : 302 - 306
- [34] Security problems of RFID authentication protocols PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND SIMULATION IN ENGINEERING (ICOSSSE '07): SYSTEM SCIENCE AND SIMULATION IN ENGINEERING, 2007, : 325 - +
- [36] A Critical Analysis of RFID Security Protocols 2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1357 - 1362
- [37] Desynchronization attacks on RFID security protocols Deng, M. (dmlei2003@163.com), 1600, Universitas Ahmad Dahlan (11):
- [39] On the Security of RFID Group Scanning Protocols IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (03): : 528 - 530
- [40] Key establishment using secure distance bounding protocols 2007 FOURTH ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2007, : 516 - 521