共 50 条
- [42] Security Analysis of Some RFID Authentication Protocols 2010 2ND INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY (EBISS 2010), 2010, : 386 - 389
- [43] Stream Cipher-Based Hash Function and Its Security E-BUSINESS AND TELECOMMUNICATIONS, 2012, 222 : 188 - 202
- [44] An efficient mutual authentication protocol on RFID tags EMERGING DIRECTIONS IN EMBEDDED AND UBIQUITOUS COMPUTING, PROCEEDINGS, 2007, 4809 : 550 - +
- [45] A Revised SRAC Authentication Protocol in RFID System 2011 INTERNATIONAL CONFERENCE ON FUTURE INFORMATION ENGINEERING (ICFIE 2011), 2011, 8 : 19 - 24
- [48] Challenge-response based RFID authentication protocol for distributed database environment SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS, 2005, 3450 : 70 - 84
- [49] Cryptanalysis of Group Key Agreement Protocol Based on Chaotic Hash Function IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS, 2011, E94D (11): : 2167 - 2170