共 50 条
- [31] Privacy of recent RFID authentication protocols [J]. INFORMATION SECURITY PRACTICE AND EXPERIENCE, 2008, 4991 : 263 - +
- [32] Proper RFID Privacy: Model and Protocols [J]. IEEE TRANSACTIONS ON MOBILE COMPUTING, 2014, 13 (12) : 2888 - 2902
- [33] A Critical Analysis of RFID Security Protocols [J]. 2008 22ND INTERNATIONAL WORKSHOPS ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS, VOLS 1-3, 2008, : 1357 - 1362
- [34] A Survey of RFID Readers Anticollision Protocols [J]. IEEE JOURNAL OF RADIO FREQUENCY IDENTIFICATION, 2018, 2 (01): : 38 - 48
- [35] Protocols for RFID tag/reader authentication [J]. DECISION SUPPORT SYSTEMS, 2007, 43 (03) : 897 - 914
- [36] Mutual Authentication Protocols for RFID Systems [J]. Machine Intelligence Research, 2008, (04) : 348 - 365
- [37] Protocols for Objects with Multiple RFID Tags [J]. ADCOM: 2008 16TH INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS, 2008, : 208 - 213
- [38] A survey of size counting in population protocols [J]. Theoretical Computer Science, 2021, 894 : 91 - 102
- [39] On the Security of RFID Group Scanning Protocols [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (03): : 528 - 530
- [40] A survey of size counting in population protocols [J]. THEORETICAL COMPUTER SCIENCE, 2021, 894 : 91 - 102