共 18 条
[1]
Avoine G., 2005, P SEL AR CRYPT SAC
[3]
Dimitriou T, 2006, PerCom 2006: Fourth Annual IEEE International Conference on Pervasive Computing and Communications, Proceedings, P269
[4]
Security and privacy issues in e-passports
[J].
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings,
2005,
:74-85
[5]
Defining strong privacy for RFID (Extended abstract)
[J].
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS,
2007,
:342-+
[6]
Dynamic key-updating: Privacy-preserving authentication for RFID systems
[J].
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS,
2007,
:13-+
[7]
ACTION: Breaking the Privacy Barrier for RFID Systems
[J].
IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5,
2009,
:1953-1961
[8]
The pros and cons of RFID in supply chain management
[J].
ICMB 2005: International Conference on Mobile Business,
2005,
:623-629
[9]
Molnar D, 2006, LECT NOTES COMPUT SC, V3897, P276
[10]
Molnar D, 2004, C COMP COMM SEC ACM, P210, DOI DOI 10.1145/1030083.1030112