共 50 条
- [21] Untraceable and Serverless RFID Authentication and Search Protocols [J]. 2011 NINTH IEEE INTERNATIONAL SYMPOSIUM ON PARALLEL AND DISTRIBUTED PROCESSING WITH APPLICATIONS WORKSHOPS (ISPAW), 2011, : 278 - 283
- [22] Scalability and Security Conflict for RFID Authentication Protocols [J]. Wireless Personal Communications, 2011, 59 : 43 - 56
- [23] Attacks on CKK family of RFID authentication protocols [J]. AD-HOC, MOBILE AND WIRELESS NETWORKS, PROCEEDINGS, 2008, 5198 : 241 - +
- [25] Review of different classes of RFID authentication protocols [J]. WIRELESS NETWORKS, 2019, 25 (03) : 961 - 974
- [28] Security Analysis of Some RFID Authentication Protocols [J]. 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389
- [29] Passive attacks on a class of authentication protocols for RFID [J]. INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 102 - 115
- [30] More on the Security of Linear RFID Authentication Protocols [J]. SELECTED AREAS IN CRYPTOGRAPHY, 2009, 5867 : 182 - 196