共 50 条
- [41] Security analysis of RFID authentication for pervasive systems using model checking [J]. 30TH ANNUAL INTERNATIONAL COMPUTER SOFTWARE AND APPLICATIONS CONFERENCE, VOL 2, SHORT PAPERS/WORKSHOPS/FAST ABSTRACTS/DOCTORAL SYMPOSIUM, PROCEEDINGS, 2006, : 195 - +
- [43] Security analysis of two recently proposed RFID authentication protocols [J]. FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2011, 5 (03): : 335 - 340
- [44] A Privacy and Authentication Protocol for Mobile RFID System [J]. 2014 IEEE INTERNATIONAL SYMPOSIUM ON INDEPENDENT COMPUTING (ISIC), 2014, : 84 - 89
- [45] Security analysis of two recently proposed RFID authentication protocols [J]. Frontiers of Computer Science in China, 2011, 5 : 335 - 340
- [46] An Efficient RFID Authentication Protocol Providing Strong Privacy and Security [J]. JOURNAL OF INTERNET TECHNOLOGY, 2016, 17 (03): : 443 - 455
- [47] Security and privacy analysis of RFID authentication protocol for ubiquitous computing [J]. PROCEEDINGS - 16TH INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATIONS AND NETWORKS, VOLS 1-3, 2007, : 1359 - +
- [48] Security and privacy on authentication protocol for low-cost RFID [J]. COMPUTATIONAL INTELLIGENCE AND SECURITY, 2007, 4456 : 788 - +
- [49] Security and Privacy Analysis of Song–Mitchell RFID Authentication Protocol [J]. Wireless Personal Communications, 2013, 69 : 1583 - 1596