共 50 条
- [31] Attacks on Recent RFID Authentication Protocols JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY, 2015, 79 (03): : 271 - 283
- [32] Security problems of RFID authentication protocols PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND SIMULATION IN ENGINEERING (ICOSSSE '07): SYSTEM SCIENCE AND SIMULATION IN ENGINEERING, 2007, : 325 - +
- [35] Serverless search and authentication protocols for RFID FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS, 2007, : 3 - +
- [36] An Approach for Formal Verification of Authentication Protocols Lobachevskii Journal of Mathematics, 2022, 43 : 443 - 454
- [37] A Novel Approaches for Visual Authentication Protocols PROCEEDINGS OF THE 2018 3RD INTERNATIONAL CONFERENCE ON INVENTIVE COMPUTATION TECHNOLOGIES (ICICT 2018), 2018, : 182 - 184
- [40] Biometric Authentication Protocols on Smartphones - An Overview SECURITY OF INFORMATION AND NETWORKS (SIN'16), 2016, : 135 - 139