共 50 条
- [31] The Research on Mutual authentication Protocol for RFID System Based on Combined Symmetric Key PROCEEDINGS OF THE 2013 INTERNATIONAL CONFERENCE ON INFORMATION, BUSINESS AND EDUCATION TECHNOLOGY (ICIBET 2013), 2013, 26 : 136 - 139
- [32] RFID Mutual Authentication Protocols Using Key Exchange Based on Hash Functions GRID AND DISTRIBUTED COMPUTING, 2011, 261 : 246 - +
- [33] RFID Authentication and Communication Protocol based on the Dynamic Active Tag ID and Key INDUSTRIAL INSTRUMENTATION AND CONTROL SYSTEMS II, PTS 1-3, 2013, 336-338 : 1913 - +
- [34] Ephemeral Key-based Hybrid Hardware Obfuscation Proceedings of 2022 19th International Bhurban Conference on Applied Sciences and Technology, IBCAST 2022, 2022, : 646 - 652
- [35] USB Key-Based Approach for Software Protection 2009 INTERNATIONAL CONFERENCE ON INDUSTRIAL MECHATRONICS AND AUTOMATION, 2009, : 151 - 153
- [36] Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing The Journal of Supercomputing, 2023, 79 : 11261 - 11299
- [37] Symmetric key-based authentication and key agreement scheme resistant against semi-trusted third party for fog and dew computing JOURNAL OF SUPERCOMPUTING, 2023, 79 (10): : 11261 - 11299
- [38] keybin Key-based Binning for Distributed Clustering 2017 IEEE INTERNATIONAL CONFERENCE ON CLUSTER COMPUTING (CLUSTER), 2017, : 572 - 581
- [39] Declustering of key-based partitioned signature files ACM TRANSACTIONS ON DATABASE SYSTEMS, 1996, 21 (03): : 295 - 338
- [40] Key-based melody segmentation for popular songs PROCEEDINGS OF THE 17TH INTERNATIONAL CONFERENCE ON PATTERN RECOGNITION, VOL 3, 2004, : 862 - 865