共 12 条
- [1] [Anonymous], 2008, Proceedings of the 9th workshop on Mobile computing systems and applications
- [2] [Anonymous], 2012, MOB MALW DEV CONT RI
- [4] HUTTER M, 2010, RFIDSEC 2010, V6370, P189
- [6] Classifying RFID attacks and defenses [J]. INFORMATION SYSTEMS FRONTIERS, 2010, 12 (05) : 491 - 505
- [7] Orthacker Clemens, 2010, P 25 TC 11 INT INF S
- [8] Othman Hanunah, 2010, 2010 International Conference on Computer Applications and Industrial Electronics (ICCAIE), P297, DOI 10.1109/ICCAIE.2010.5735093
- [9] Papadimitratos Panagiotis., 2008, MILCOM 2008 2008 IEE, P1
- [10] Schrooyen M., 2008, P ECUMICT GENT BELG