共 50 条
- [21] RFID Mutual Authentication Protocol based on Synchronized Secret [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (04): : 37 - 49
- [22] RFID mutual authentication protocol based on chaos key [J]. ADVANCES IN MECHATRONICS, AUTOMATION AND APPLIED INFORMATION TECHNOLOGIES, PTS 1 AND 2, 2014, 846-847 : 1519 - 1523
- [23] Lightweight Protocol for Anonymity and Mutual Authentication in RFID Systems [J]. 2015 12TH ANNUAL IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE, 2015, : 910 - 915
- [24] Mutual Authentication Protocol for RFID Security using NFSR [J]. PROCEEDINGS OF 2015 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATION SOFTWARE AND NETWORKS (ICCSN), 2015, : 255 - 259
- [25] Low cost minimal mutual authentication protocol for RFID [J]. PROCEEDINGS OF 2008 IEEE INTERNATIONAL CONFERENCE ON NETWORKING, SENSING AND CONTROL, VOLS 1 AND 2, 2008, : 620 - +
- [26] Security Analysis of a Mutual Authentication Protocol for RFID Systems [J]. PROCEEDINGS OF THE 2012 SECOND INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC 2012), 2012, : 252 - 255
- [27] An Effective Ultralightweight RFID Secure Protocol with Mutual Authentication [J]. ADVANCES IN MECHATRONICS AND CONTROL ENGINEERING, PTS 1-3, 2013, 278-280 : 1966 - +
- [28] Scalable RFID mutual authentication protocol with backward privacy [J]. Jisuanji Yanjiu yu Fazhan/Computer Research and Development, 2013, 50 (06): : 1276 - 1284
- [29] An Improved Lightweight RFID Mutual-authentication Protocol [J]. PROCEEDINGS OF THE SECOND INTERNATIONAL CONFERENCE ON MECHANICS, MATERIALS AND STRUCTURAL ENGINEERING (ICMMSE 2017), 2017, 102 : 278 - 284
- [30] A RFID Mutual Authentication Security Protocol Design and Analysis [J]. 2014 NINTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC), 2014, : 508 - 512