共 50 条
- [43] Formal Verification of RFID Protocols Using nuXmv [J]. PROCEEDINGS OF 2016 10TH IEEE INTERNATIONAL CONFERENCE ON ANTI-COUNTERFEITING, SECURITY, AND IDENTIFICATION (ASID), 2016, : 58 - 62
- [44] Single RFID Tag Ownership Transfer Protocols [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART C-APPLICATIONS AND REVIEWS, 2012, 42 (02): : 164 - 173
- [45] Review of different classes of RFID authentication protocols [J]. WIRELESS NETWORKS, 2019, 25 (03) : 961 - 974
- [46] Attacks on CKK family of RFID authentication protocols [J]. AD-HOC, MOBILE AND WIRELESS NETWORKS, PROCEEDINGS, 2008, 5198 : 241 - +
- [47] Scalability and Security Conflict for RFID Authentication Protocols [J]. Wireless Personal Communications, 2011, 59 : 43 - 56
- [49] A Salient Missing Link in RFID Security Protocols [J]. EURASIP Journal on Wireless Communications and Networking, 2011