共 30 条
- [1] A scalable and provably secure hash-based RFID protocol [J]. Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 110 - 114
- [2] Secure Hash-based Search Protocols for RFID Systems [J]. INTERNATIONAL JOURNAL OF FUTURE GENERATION COMMUNICATION AND NETWORKING, 2013, 6 (04): : 49 - 59
- [3] A hash-based pseudonymization infrastructure for RFID systems [J]. SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2006, : 22 - +
- [4] Zero Knowledge and Hash-Based Secure Access Control Scheme for Mobile RFID Systems [J]. Arabian Journal for Science and Engineering, 2014, 39 : 1897 - 1906
- [6] HASH-BASED FILE CONTENT IDENTIFICATION USING DISTRIBUTED SYSTEMS [J]. ADVANCES IN DIGITAL FORENSICS IX, 2013, 410 : 119 - 134
- [7] Improve Healthcare Safety Using Hash-Based Authentication Protocol for RFID Systems [J]. 2018 9TH IEEE ANNUAL UBIQUITOUS COMPUTING, ELECTRONICS & MOBILE COMMUNICATION CONFERENCE (UEMCON), 2018, : 800 - 805
- [8] Secure Hash-Based Password Authentication Protocol Using Smartcards [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2011, PT V, 2011, 6786 : 593 - 606
- [9] Hash-based RFID security protocol using randomly key-changed identification procedure [J]. COMPUTATIONAL SCIENCE AND ITS APPLICATIONS - ICCSA 2006, PT 4, 2006, 3983 : 296 - 305