共 50 条
- [31] Desynchronization attacks on RFID security protocols [J]. Deng, M. (dmlei2003@163.com), 1600, Universitas Ahmad Dahlan (11):
- [32] On the Security of RFID Group Scanning Protocols [J]. IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2010, E93D (03): : 528 - 530
- [33] Standard-Based Teaching Quality Assessment [J]. Proceedings of the 2016 International Conference on Education, E-learning and Management Technology, 2016, 44 : 152 - 155
- [34] Building standard-based survey software [J]. ASC 2003: THE IMPACT OF TECHNOLOGY ON THE SURVEY PROCESS, 2003, : 217 - 224
- [35] Symmetric Key-Based Lightweight Authentication Protocols for RFID Security [J]. 2018 32ND INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA), 2018, : 488 - 495
- [36] SAREF4health: IoT Standard-Based Ontology-Driven Healthcare Systems [J]. FORMAL ONTOLOGY IN INFORMATION SYSTEMS (FOIS 2018), 2018, 306 : 239 - 252
- [37] Untraceable Analysis of Scalable RFID Security Protocols [J]. WIRELESS PERSONAL COMMUNICATIONS, 2019, 109 (03) : 1747 - 1767
- [38] A Salient Missing Link in RFID Security Protocols [J]. EURASIP Journal on Wireless Communications and Networking, 2011
- [39] Scalability and Security Conflict for RFID Authentication Protocols [J]. Wireless Personal Communications, 2011, 59 : 43 - 56
- [40] Security Issues in Ultralightweight RFID Authentication Protocols [J]. Wireless Personal Communications, 2018, 98 : 779 - 814