共 17 条
- [2] Doss R., 2012, COMPUTER NE IN PRESS
- [3] An authentication protocol in a security layer for RFID smart tags [J]. MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3, 2004, : 759 - 762
- [4] Finkenzeller K., 2002, RFID handbook
- [6] Kim Hyun-Sung, 2012, [Journal of Security Engineering, 보안공학연구논문지], V9, P357
- [7] Langheinrich M., 2008, P IEEE INT C RFID, P58
- [9] Mitrokotsa A., 2008, P 2 INT WORKSH RFID
- [10] OHKUBO M, 2003, P RFID PRIV WORKSH 2