共 50 条
- [31] Algebraic Attacks on RFID Protocols [J]. INFORMATION SECURITY THEORY AND PRACTICE: SMART DEVICES, PERVASIVE SYSTEMS, AND UBIQUITOUS NETWORKS, PROCEEDINGS, 2009, 5746 : 38 - 51
- [33] Study Of RFID Authentication Protocols [J]. 2018 FOURTH INTERNATIONAL CONFERENCE ON COMPUTING COMMUNICATION CONTROL AND AUTOMATION (ICCUBEA), 2018,
- [34] RFID Tags - Grouping Proof with Forward Security [J]. 2013 IEEE INTERNATIONAL CONFERENCE ON RFID-TECHNOLOGIES AND APPLICATIONS (RFID-TA), 2013,
- [35] Offline Grouping Proof Protocol for RFID Systems [J]. 2013 IEEE 9TH INTERNATIONAL CONFERENCE ON WIRELESS AND MOBILE COMPUTING, NETWORKING AND COMMUNICATIONS (WIMOB), 2013, : 247 - 252
- [36] On Unequal Missing Protection of the Grouping of RFID Tags [J]. 2015 IEEE INTERNATIONAL SYMPOSIUM ON INFORMATION THEORY (ISIT), 2015, : 2994 - 2998
- [37] MID Tag Grouping Protocols Made Private [J]. 2017 47TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS WORKSHOPS (DSN-W 2017), 2017, : 105 - 106
- [38] Attacks on and Countermeasures for Two RFID Protocols [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5825 - 5848
- [39] Attacks on and Countermeasures for Two RFID Protocols [J]. Wireless Personal Communications, 2017, 96 : 5825 - 5848
- [40] Theoretical Analysis of RFID Security Protocols [J]. 2014 IEEE INTERNATIONAL CONFERENCE ON INDUSTRIAL ENGINEERING AND ENGINEERING MANAGEMENT (IEEM), 2014, : 302 - 306