共 12 条
[1]
Chang Allen Y., 2009, 2009 IEEE 43rd International Carnahan Conference on Security Technology. ICCST 2009, P36, DOI 10.1109/CCST.2009.5335567
[2]
An Efficient Anonymous Authentication Protocol for RFID Systems Using Dynamic Tokens
[J].
2015 IEEE 35th International Conference on Distributed Computing Systems,
2015,
:756-757
[3]
A secure authentication scheme for RFID systems
[J].
1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015,
2016, 78
:100-106
[4]
Dromard J, 2013, 2013 20TH INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS (ICT)
[5]
Gui YQ, 2013, 2013 INTERNATIONAL CONFERENCE ON ICT CONVERGENCE (ICTC 2013): FUTURE CREATIVE CONVERGENCE TECHNOLOGIES FOR NEW ICT ECOSYSTEMS, P359, DOI 10.1109/ICTC.2013.6675373
[6]
Jianqing Fu, 2010, 2010 2nd International Conference on Computer Engineering and Technology (ICCET), P497, DOI 10.1109/ICCET.2010.5485559
[7]
Li J, 2010, PROCEEDINGS OF 2010 INTERNATIONAL CONFERENCE ON LOGISTICS SYSTEMS AND INTELLIGENT MANAGEMENT, VOLS 1-3, P1648, DOI 10.1109/ICLSIM.2010.5461250
[8]
Li S., 2015, INFORM SYSTEMS FRONT, V17, P243
[9]
Rahman M, 2015, CONSUM COMM NETWORK, P910, DOI 10.1109/CCNC.2015.7158097