共 50 条
- [1] Security analysis of two recently proposed RFID authentication protocols [J]. FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2011, 5 (03): : 335 - 340
- [2] Vulnerabilities of two Recently RFID Authentication Protocols [J]. PROCEEDINGS OF 2012 INTERNATIONAL CONFERENCE ON COMPLEX SYSTEMS (ICCS12), 2012, : 475 - 480
- [3] Security analysis of two lightweight RFID authentication protocols [J]. annals of telecommunications - annales des télécommunications, 2014, 69 : 273 - 282
- [4] Security analysis of two lightweight RFID authentication protocols [J]. ANNALS OF TELECOMMUNICATIONS-ANNALES DES TELECOMMUNICATIONS, 2014, 69 (5-6): : 273 - 282
- [5] Security Analysis and Improvement on Two RFID Authentication Protocols [J]. Wireless Personal Communications, 2015, 82 : 21 - 33
- [7] Security analysis of two ultra-lightweight RFID authentication protocols [J]. NEW APPROACHES FOR SECURITY, PRIVACY AND TRUST IN COMPLEX ENVIRONMENTS, 2007, 232 : 109 - +
- [8] Security Analysis of Some RFID Authentication Protocols [J]. 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389
- [9] On the Security of RFID Authentication Protocols [J]. 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT), 2015,