共 154 条
[51]
HanataniI Y., 2012, Financial Cryptography and Data Security, P70, DOI [10.1007/978- 3-642- 29889-9 7, DOI 10.1007/978-3-642-29889-97]
[54]
He L., 2009, J BIOMED NANOTECHNOL, V5, P1
[55]
Henrici D, 2004, SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, P149
[56]
Providing Security and Privacy in RFID Systems Using Triggered Hash Chains
[J].
2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS,
2008,
:50-59
[57]
Hernandez-Castro J. C., 2009, INT WORKSH COD CRYPT
[58]
Hopper N.J., 2001, Advances in Cryptology - ASIACRYPT 2001, P52, DOI DOI 10.1007/3-540-45682-1
[59]
An Ultralightweight Mutual Authentication Protocol for EPC C1G2 RFID Tags
[J].
2012 FIFTH INTERNATIONAL SYMPOSIUM ON PARALLEL ARCHITECTURES, ALGORITHMS AND PROGRAMMING (PAAP),
2012,
:133-140
[60]
Hwang R J., 2010, Journal of Computer Science, V21, P18