共 8 条
[1]
[Anonymous], 1993, Lecture Notes in Computer Science
[2]
Clulow J, 2006, LECT NOTES COMPUT SC, V4357, P83
[3]
Hancke GP, 2008, WISEC'08: PROCEEDINGS OF THE FIRST ACM CONFERENCE ON WIRELESS NETWORK SECURITY, P194
[4]
An RFID distance bounding protocol
[J].
FIRST INTERNATIONAL CONFERENCE ON SECURITY AND PRIVACY FOR EMERGING AREAS IN COMMUNICATIONS NETWORKS, PROCEEDINGS,
2005,
:67-73
[6]
Kawaguchi D., 2014, Data clock recovery loop jam set using subcarrier frequency estimate, Patent No. [US8731118B2, 8731118]
[7]
Li GJ, 2011, INFORMATION SCIENCE AND TECHNOLOGY IN CHINA: A ROADMAP TO 2050, P19