共 50 条
- [1] Security analysis of RFID authentication for pervasive systems using model checking [J]. 30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 195 - +
- [2] A Security and Privacy Model for Mobile RFID Systems in the Internet of Things [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 726 - 732
- [3] RFID systems and security and privacy implications [J]. CRYPTOGRAPHIC HARDWARE AND EMBEDDED SYSTEMS - CHES 2002, 2002, 2523 : 454 - 469
- [4] Information confinement, privacy, and security in RFID systems [J]. COMPUTER SECURITY - ESORICS 2007, PROCEEDINGS, 2007, 4734 : 187 - +
- [5] Investigating attacks to improve security and privacy in RFID systems using the security bit method [J]. 2019 IEEE 5TH CONFERENCE ON KNOWLEDGE BASED ENGINEERING AND INNOVATION (KBEI 2019), 2019, : 833 - 838
- [7] Providing Security and Privacy in RFID Systems Using Triggered Hash Chains [J]. 2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, 2008, : 50 - 59
- [8] Confronting security and privacy threats in modem RFID systems [J]. 2006 FORTIETH ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1-5, 2006, : 2058 - +
- [9] Security Analysis and Legal Compliance Checking for the Design of Privacy-friendly Information Systems [J]. PROCEEDINGS OF THE 22ND ACM SYMPOSIUM ON ACCESS CONTROL MODELS AND TECHNOLOGIES (SACMAT'17), 2017, : 247 - 254
- [10] An Approach to Security and Privacy of RFID Systems in Anti-Desynchronization [J]. INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2010, 10 (04): : 40 - 44