共 16 条
[1]
Fu W. X, 2014, RES RFID ENCRYPTION
[2]
Gao L., 2017, WIRELESS PERS COMMUN, P1
[3]
Guo D. H, 2009, RFID SECURITY MECH B, DOI DOI 10.1007/S11390-007-9010-1
[4]
Kun Wang, 2010, 2010 International Conference on Computer Application and System Modeling (ICCASM 2010), P133, DOI 10.1109/ICCASM.2010.5622549
[6]
Lin K, 2015, IEEE COMPUT SOC CONF, DOI 10.1109/CVPRW.2015.7301269
[8]
So W, 2017, P 8 ACM IEEE S ARCH, P85
[9]
Song Y, 2014, J NE NORMAL U
[10]
Wang M, 2017, J BEIJING I GRAPHIC