共 15 条
[1]
Giusto D., Iera A., Morabito G., Atzori L., The Internet of Things, Springer, (2010)
[2]
Magrassi P., Berg T., A World of Smart Objects, Gartner Research Report R-17-2243, (2002)
[3]
Magrassi P., Panarella A., Deighton N., Johnson G., Computers to Acquire Control of the Physical World, (2001)
[4]
Miles S.B., RFID Technology and Applications, pp. 6-8, (2011)
[5]
Haining Y., Hongli Z., Binxing F., Xiangzhan Y., A large scale code resolution service network in the internet of things, Sensors(basel, Switzerland), 12, 11, (2012)
[6]
Xiaoxial L., Huang J.S., Zujue C., The research of ranging with timing over packet network for the mine safety application, Journal of Networks, 7, 7, pp. 1054-1062, (2012)
[7]
Yiming Z., Anti-cloning and secure RFID mutual authentication protocols, Proceedings-2011 4th IEEE Internationa Conference on Broadband Network and Multimedia Technology, pp. 379-384, (2011)
[8]
Chengxiang T., Bo J., Xiang Z., Yuebo D., RFID-based electronic identity security cloud platform in cyberspace, Journal of Networks, 7, 7, pp. 1131-1138, (2012)
[9]
Zhengxia W., Internet of things: A new application for intelligent traffic monitoring system, Journal of Networks, 6, 6, pp. 887-894, (2011)
[10]
Wang S., Ma Q., Zhang Y., Li Y., An authentication protocol for RFID tag and its simulation, Journal of Networks, 6, 3, pp. 446-453, (2011)