共 34 条
[1]
[Anonymous], 2003, THESIS
[2]
Avoine G., 2007, Proceedings of the IEEE International Symposium on a World of Wireless Mobile and Multimedia Networks, P1
[3]
Che W., 2008, Networked RFID Systems and Lightweight Cryptography, V16, P279, DOI DOI 10.1007/978-3-540-71641-9_16
[4]
Cimato Stelvio, 2008, 2008 IEEE 32nd International Computer Software and Applications Conference (COMPSAC), P673, DOI 10.1109/COMPSAC.2008.152
[5]
Czeskis A, 2008, CCS'08: PROCEEDINGS OF THE 15TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P479
[6]
Díaz C, 2003, LECT NOTES COMPUT SC, V2482, P54
[7]
A lightweight RFID protocol to protect against traceability and cloning attacks
[J].
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings,
2005,
:59-66
[8]
Dimitriou T, 2006, PerCom 2006: Fourth Annual IEEE International Conference on Pervasive Computing and Communications, Proceedings, P269
[9]
Hoque ME, 2011, INT CONF PERVAS COMP, P102, DOI 10.1109/PERCOM.2011.5767573
[10]
Huang C., 2006, Proceedings of the IEEE International Conference on Solid-State and Integrated Circuit Technology, P1595