共 50 条
- [1] A bound on attacks on authentication protocols [J]. FOUNDATIONS OF INFORMATION TECHNOLOGY IN THE ERA OF NETWORK AND MOBILE COMPUTING, 2002, 96 : 588 - 600
- [2] Errors in attacks on authentication protocols [J]. ARES 2007: SECOND INTERNATIONAL CONFERENCE ON AVAILABILITY, RELIABILITY AND SECURITY, PROCEEDINGS, 2007, : 223 - 229
- [3] Attacks on Recent RFID Authentication Protocols [J]. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2015, 79 (03): : 271 - 283
- [4] Attacks on Recent RFID Authentication Protocols [J]. Journal of Signal Processing Systems, 2015, 79 : 271 - 283
- [6] Development in Authentication of AODV Protocols to Resist the Attacks [J]. INFORMATION AND SOFTWARE TECHNOLOGIES (ICIST 2013), 2013, 403 : 334 - 344
- [7] Passive attacks on a class of authentication protocols for RFID [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 102 - 115
- [8] Design of Authentication Protocols Preventing Replay Attacks [J]. 2009 INTERNATIONAL CONFERENCE ON FUTURE BIOMEDICAL INFORMATION ENGINEERING (FBIE 2009), 2009, : 362 - 365
- [9] Algebraic Replay Attacks on Authentication in RFID Protocols [J]. ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 153 - +
- [10] Attacks on CKK family of RFID authentication protocols [J]. AD-HOC, MOBILE AND WIRELESS NETWORKS, PROCEEDINGS, 2008, 5198 : 241 - +