共 50 条
- [1] Authentication Protocol of RFID System Based on Security Policy [J]. 2013 THIRD INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2013, : 1242 - 1246
- [2] DESIGNING OF AUTHENTICATION PROTOCOL FOR MULTI-LEVEL SECURITY VIRTUAL DESKTOPS [J]. 2014 IEEE 3RD INTERNATIONAL CONFERENCE ON CLOUD COMPUTING AND INTELLIGENCE SYSTEMS (CCIS), 2014, : 465 - 469
- [3] Research on RFID Security Authentication Protocol Based on HASH Function [J]. 2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 251 - 255
- [4] Research on hash-based RFID security authentication protocol [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2009, 46 (04): : 583 - 592
- [6] Research on a provable security RFID authentication protocol based on Hash function [J]. Yinhui, Yu (yuyh@jlu.edu.cn), 2016, Beijing University of Posts and Telecommunications (23):
- [8] On the Security of an ECC Based RFID Authentication Protocol [J]. 2012 9TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2012, : 111 - 114
- [9] Research on Multiple security authentication protocol in RFID System [J]. FRONTIERS OF MECHANICAL ENGINEERING AND MATERIALS ENGINEERING II, PTS 1 AND 2, 2014, 457-458 : 770 - 773
- [10] A Security RFID Authentication Protocol Based on Hash Function [J]. IEEC 2009: FIRST INTERNATIONAL SYMPOSIUM ON INFORMATION ENGINEERING AND ELECTRONIC COMMERCE, PROCEEDINGS, 2009, : 804 - 807