共 12 条
[1]
[Anonymous], 2008, Proceedings of the 9th workshop on Mobile computing systems and applications
[2]
[Anonymous], 2012, MOB MALW DEV CONT RI
[4]
HUTTER M, 2010, RFIDSEC 2010, V6370, P189
[6]
Classifying RFID attacks and defenses
[J].
INFORMATION SYSTEMS FRONTIERS,
2010, 12 (05)
:491-505
[7]
Orthacker Clemens, 2010, P 25 TC 11 INT INF S
[8]
Othman Hanunah, 2010, 2010 International Conference on Computer Applications and Industrial Electronics (ICCAIE), P297, DOI 10.1109/ICCAIE.2010.5735093
[9]
Papadimitratos Panagiotis., 2008, MILCOM 2008 2008 IEE, P1
[10]
Schrooyen M., 2008, P ECUMICT GENT BELG