共 46 条
[1]
Abyaneh M. R. S., 2010, Proceedings 2010 IEEE/IFIP 8th International Conference on Embedded and Ubiquitous Computing (EUC 2010), P523, DOI 10.1109/EUC.2010.86
[2]
[Anonymous], 2009044 CRYPT EPRINT
[4]
Bosley C., 2011, HB HB LIKE PROTOCOL, V2011, P350
[5]
Bringer J., 2008, ARXIV08020603
[6]
HB++:: a lightweight authentication protocol secure against some attacks
[J].
SECOND INTERNATIONAL WORKSHOP ON SECURITY, PRIVACY AND TRUST IN PERVASIVE AND UBIQUITOUS COMPUTING, PROCEEDINGS,
2006,
:28-+
[7]
Cole P.H., 2008, Networked RFID Systems and Lightweight Cryptography: Raising Barriers to Product Counterfeiting
[8]
Duc D.N., 2007, I EL INF COMM ENG S
[9]
Feldhofer M., 2005, IEE Proceedings-Information Security, V152, P13, DOI 10.1049/ip-ifs:20055006
[10]
Feldhofer M, 2004, LECT NOTES COMPUT SC, V3156, P357