共 41 条
[1]
Abawajy J, 2009, NSS: 2009 3RD INTERNATIONAL CONFERENCE ON NETWORK AND SYSTEM SECURITY, P18, DOI 10.1109/NSS.2009.101
[2]
Physically unclonable function-based security and privacy in RFID systems
[J].
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS,
2007,
:211-+
[3]
Broder Andrei, 2002, Internet mathematics, P636, DOI DOI 10.1080/15427951.2004.10129096
[6]
Chen SG, 2011, IEEE INFOCOM SER, P3101, DOI 10.1109/INFCOM.2011.5935155
[7]
Dean G., 2006, RFID WEAPONS ARMOURY, V22
[8]
Delen D, 2007, PROD OPER MANAG, V16, P613
[9]
Design and implementation of PUF-based "Unclonable" RFID ICs for anti-counterfeiting and security applications
[J].
2008 IEEE INTERNATIONAL CONFERENCE ON RFID,
2008,
:58-+
[10]
Dimitriou T., 2006, P IEEE SECURECOMM, P59