共 41 条
[11]
Byres E., Franz M., Miller D., The use of attack trees in assessing vulnerabilities in SCADA systems, Proceedings of the International Infrastructure Survivability Workshop, (2004)
[12]
Hentea M., A perspective on security risk management of SCADA control systems, Proceedings of ISCA 23rd International Conference on Computers and their Applications, CATA 2008, pp. 222-227, (2008)
[13]
Hein D., Wolkerstorfer J., Felber N., ECC is Ready for RFID – A Proof in Silicon, Conference on RFID Security, (2008)
[14]
Hermans J., Lightweight Public Key Cryptography (Dortoral dissertation, PhD thesis, Katholieke Universiteit Leuven, (2012)
[15]
Feldhofer M., Dominikus S., Wolkerstorfer J., Strong Authentication for RFID Systems Using the AES Algorithm, CHES 2004. LNCS, 3156, pp. 357-370, (2004)
[16]
Deng G., Li H., Zhang Y., Wang J., Tree-LSHB+: An LPN-Based Lightweight Mutual Authetication RFID Protocol, Wireless Personal Communications, pp. 1-16, (2013)
[17]
El Moustaine E., Laurent M., GPS+: A back-end coupons identification for low-cost RFID, Proceedings of the sixth ACM Conference on Security and Privacy in wireless and Mobile Networks, pp. 73-78, (2013)
[18]
(2007)
[19]
(2007)
[20]
Sadeghi A.R., Visconti I., Wachsmann C., Anonymizer-enabled Security and Privacy for RFID, CANS 2009. LNCS, 5888, pp. 134-153, (2009)