共 50 条
- [41] Security of an RFID Based Authentication Protocol with Bitwise Operations for Supply Chain Wireless Personal Communications, 2022, 126 : 1881 - 1894
- [43] An Gen2 Based Security Authentication Protocol for RFID System INTERNATIONAL CONFERENCE ON APPLIED PHYSICS AND INDUSTRIAL ENGINEERING 2012, PT B, 2012, 24 : 1385 - 1391
- [44] A Gen2 Based Security Authentication Protocol for RFID System 2010 INTERNATIONAL COLLOQUIUM ON COMPUTING, COMMUNICATION, CONTROL, AND MANAGEMENT (CCCM2010), VOL III, 2010, : 402 - 405
- [45] Cryptanalysis of AN RFID Ownership Transfer Protocol Based on Cloud On Security of AN RFID Ownership Transfer Protocol Based on Cloud 2018 5TH IEEE INTERNATIONAL CONFERENCE ON CYBER SECURITY AND CLOUD COMPUTING (IEEE CSCLOUD 2018) / 2018 4TH IEEE INTERNATIONAL CONFERENCE ON EDGE COMPUTING AND SCALABLE CLOUD (IEEE EDGECOM 2018), 2018, : 134 - 139
- [46] Authentication Protocol of RFID System Based on Security Policy 2013 THIRD INTERNATIONAL CONFERENCE ON INSTRUMENTATION & MEASUREMENT, COMPUTER, COMMUNICATION AND CONTROL (IMCCC), 2013, : 1242 - 1246
- [47] Elliptic Curve Signcryption Based Security Protocol for RFID KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2020, 14 (01): : 344 - 365
- [48] Research on the Authentication of Radio Frequency Identification based on the Hash function INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2015, 9 (06): : 209 - 216
- [49] A new hash-based authentication protocol for RFID using varying identifiers SENSORS, MEASUREMENT AND INTELLIGENT MATERIALS, PTS 1-4, 2013, 303-306 : 2112 - 2116
- [50] RFID Security Protocol Trace Attack and Desynchronizing Attack Deep Research 2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 918 - 922