共 39 条
[1]
Abughazalah S, 2016, IEEE INT CONF RFID, P161
[2]
[Anonymous], 2015, REP
[3]
Untraceability Model for RFID
[J].
IEEE TRANSACTIONS ON MOBILE COMPUTING,
2014, 13 (10)
:2397-2405
[4]
Bolotnyy L, 2006, 2006 3RD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS - WORKSHOPS, P1
[5]
Burmester M, 2008, LECT NOTES COMPUT SC, V5189, P176, DOI 10.1007/978-3-540-85893-5_13
[6]
Burmester M, 2016, IEEE INT CONF RFID, P146
[7]
Cheng S., 2017, PROC AUST COMPUT SCI, P1
[8]
Cherkassky V., 2019, IEEE IJCNN, P1, DOI [DOI 10.1109/ijcnn.2019.8852183, 10.1109/IJCNN.2019.8852183, DOI 10.1109/RFID.2019.8719277]
[9]
Cherneva V., 2018, PROC INT MULTICONFER, P1
[10]
Tree-Based RFID Yoking Proof
[J].
NSWCTC 2009: INTERNATIONAL CONFERENCE ON NETWORKS SECURITY, WIRELESS COMMUNICATIONS AND TRUSTED COMPUTING, VOL 1, PROCEEDINGS,
2009,
:550-553