共 50 条
- [21] A Simple and Effective Attack Against an Authenticaion Protocol for RFID Systems PROCEEDINGS OF 2017 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND COMMUNICATIONS (ICCC), 2017, : 1052 - 1055
- [22] Detecting Clocking Attack in Contactless Access Control Systems 2017 FIFTH INTERNATIONAL CONFERENCE ON ADVANCED CLOUD AND BIG DATA (CBD), 2017, : 285 - 290
- [23] Probabilistic Approach for Recommendation Systems 2022 21ST IEEE INTERNATIONAL CONFERENCE ON MACHINE LEARNING AND APPLICATIONS, ICMLA, 2022, : 629 - 634
- [27] A systematic approach for the reliability of RFID systems TENCON 2004 - 2004 IEEE REGION 10 CONFERENCE, VOLS A-D, PROCEEDINGS: ANALOG AND DIGITAL TECHNIQUES IN ELECTRICAL ENGINEERING, 2004, : B183 - B186
- [28] Fast and Reliable Tag Search in Large-Scale RFID Systems: A Probabilistic Tree-based Approach IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (IEEE INFOCOM 2018), 2018, : 1133 - 1141
- [30] An attack-norm separation approach for detecting cyber attacks Information Systems Frontiers, 2006, 8 : 163 - 177