共 50 条
- [31] A review of authentication protocols for rfid security on smart healthcare [J]. TARUMANAGARA INTERNATIONAL CONFERENCE ON THE APPLICATIONS OF TECHNOLOGY AND ENGINEERING, 2019, 508
- [32] A Study on the Security of RFID with Enhancing Privacy Protection [J]. PROCEEDINGS OF THE 7TH EUROPEAN CONFERENCE ON INFORMATION WARFARE AND SECURITY, 2008, : 35 - 40
- [34] Enhancing RFID Search Protocols based on Counters [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2012, 15 (02): : 657 - 669
- [36] Provably privacy analysis and improvements of the lightweight RFID authentication protocols [J]. Wireless Networks, 2020, 26 : 2153 - 2169
- [37] Privacy Analysis and Improvements of Two Recent RFID Authentication Protocols [J]. 2014 11TH INTERNATIONAL ISC CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2014, : 137 - 142
- [39] Are RNGs Achilles’ Heel of RFID Security and Privacy Protocols? [J]. Wireless Personal Communications, 2018, 100 : 1355 - 1375
- [40] Security analysis of RFID authentication for pervasive systems using model checking [J]. 30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 195 - +