共 14 条
[1]
A scalable and provably secure hash-based RFID protocol
[J].
Third IEEE International Conference on Pervasive Computing and Communications, Workshops,
2005,
:110-114
[2]
AVOINE G, 2005, LECT NOTES COMPUTER, P291
[3]
GAUKLER GM, THESIS STANFORD U
[4]
Holtz K., 1993, Wescon/93 Conference Record (Cat. No.93RC0500-9), P140, DOI 10.1109/WESCON.1993.488424
[5]
Juels A., 2006, IEEE J FEB, P35
[6]
Multiple pattern matching in LZW compressed text
[J].
DCC '98 - DATA COMPRESSION CONFERENCE,
1998,
:103-112
[7]
KIM TS, AUTHORIZATION POLICY
[8]
Landt J., 2001, Shrouds of time: The history of RFID
[10]
PARK SM, LOAD BALANCING METHO