共 50 条
- [1] Security and privacy analysis of RFID systems using model checking [J]. HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2006, 4208 : 495 - 504
- [2] Security Analysis of a Mutual Authentication Protocol for RFID Systems [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 252 - 255
- [3] Security Enhancement of the Authentication Protocol for RFID Systems [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 521 - +
- [4] An Authentication Protocol Applied to RFID Security Systems [J]. FIFTH INTERNATIONAL CONFERENCE ON INFORMATION ASSURANCE AND SECURITY, VOL 2, PROCEEDINGS, 2009, : 307 - +
- [5] Security Analysis of Some RFID Authentication Protocols [J]. 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389
- [7] Enhancing Privacy and Security of RFID System with Serverless Authentication and Search Protocols in Pervasive Environments [J]. Wireless Personal Communications, 2010, 55 : 65 - 79
- [8] RFID Systems Integrated OTP Security Authentication Design [J]. 2013 ASIA-PACIFIC SIGNAL AND INFORMATION PROCESSING ASSOCIATION ANNUAL SUMMIT AND CONFERENCE (APSIPA), 2013,
- [9] Model Checking Pervasive Context-Aware Systems [J]. 2014 IEEE 23RD INTERNATIONAL WETICE CONFERENCE (WETICE), 2014, : 92 - 97
- [10] Mutual Authentication Protocol for RFID Security using NFSR [J]. PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2015, : 255 - 259