共 50 条
- [1] Algebraic Replay Attacks on Authentication in RFID Protocols [J]. ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 153 - +
- [2] Attacks on Recent RFID Authentication Protocols [J]. Journal of Signal Processing Systems, 2015, 79 : 271 - 283
- [3] Attacks on Recent RFID Authentication Protocols [J]. JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2015, 79 (03): : 271 - 283
- [4] Attacks on and Countermeasures for Two RFID Protocols [J]. WIRELESS PERSONAL COMMUNICATIONS, 2017, 96 (04) : 5825 - 5848
- [5] Attacks on and Countermeasures for Two RFID Protocols [J]. Wireless Personal Communications, 2017, 96 : 5825 - 5848
- [6] Attacks on CKK family of RFID authentication protocols [J]. AD-HOC, MOBILE AND WIRELESS NETWORKS, PROCEEDINGS, 2008, 5198 : 241 - +
- [7] Data desynchronization attacks on RFID security protocols [J]. Huazhong Keji Daxue Xuebao (Ziran Kexue Ban)/Journal of Huazhong University of Science and Technology (Natural Science Edition), 2013, 41 (04): : 65 - 69
- [8] Passive attacks on a class of authentication protocols for RFID [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 102 - 115
- [10] Grobner Basis Attacks on Lightweight RFID Authentication Protocols [J]. JOURNAL OF INFORMATION PROCESSING SYSTEMS, 2011, 7 (04): : 691 - 706