共 50 条
- [1] Counting with Population Protocols [J]. 2015 IEEE 14TH INTERNATIONAL SYMPOSIUM ON NETWORK COMPUTING AND APPLICATIONS (NCA), 2015, : 35 - 42
- [2] Untraceability of RFID protocols [J]. INFORMATION SECURITY THEORY AND PRACTICES: SMART DEVICES, CONVERGENCE AND NEXT GENERATION NETWORKS, 2008, 5019 : 1 - 15
- [3] RFID Security Protocols [J]. IIT: 2008 INTERNATIONAL CONFERENCE ON INNOVATIONS IN INFORMATION TECHNOLOGY, 2008, : 233 - 237
- [4] Efficient RFID Grouping Protocols [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2016, 24 (05) : 3177 - 3190
- [5] Fast RFID Polling Protocols [J]. PROCEEDINGS 45TH INTERNATIONAL CONFERENCE ON PARALLEL PROCESSING - ICPP 2016, 2016, : 304 - 313
- [6] A Survey of RFID Authentication Protocols [J]. 2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1346 - 1350
- [7] On the Security of RFID Authentication Protocols [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT), 2015,
- [9] Fast RFID Grouping Protocols [J]. 2015 IEEE CONFERENCE ON COMPUTER COMMUNICATIONS (INFOCOM), 2015,
- [10] Algebraic Attacks on RFID Protocols [J]. INFORMATION SECURITY THEORY AND PRACTICE: SMART DEVICES, PERVASIVE SYSTEMS, AND UBIQUITOUS NETWORKS, PROCEEDINGS, 2009, 5746 : 38 - 51