共 15 条
[1]
[Anonymous], 2008, P 2008 ACM S INFORM
[2]
[Anonymous], 2010, PRIVACY PRESERVING R
[3]
Bellare M, 2000, LECT NOTES COMPUT SC, V1807, P139
[4]
CHEN CL, 2010, P IEEE BWCCA2010, P423
[5]
Donggeon Lee, 2010, Proceedings of the Seventh International Conference on Information Technology: New Generations (ITNG 2010), P625, DOI 10.1109/ITNG.2010.188
[6]
Garcia FD, 2010, LECT NOTES COMPUT SC, V6035, P194, DOI 10.1007/978-3-642-12510-2_14
[7]
A Security-provable Authentication and Key Agreement Protocol in RFID System
[J].
2007 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING, VOLS 1-15,
2007,
:2078-2080
[8]
Juels Ari., 2006, DEFINING STRONG PRIV
[9]
LaMacchia B, 2007, LECT NOTES COMPUT SC, V4784, P1
[10]
Lee HG, 2006, First International Conference on Availability, Reliability and Security, Proceedings, P510