共 21 条
[1]
[Anonymous], 2008, EPC radio-frequency identity protocols generation-2 UHF RFID
[2]
[Anonymous], RFID PRIV WORKSH NOV
[3]
CHEN YC, 2007, P 9 INT C ADV COMM T, P255, DOI DOI 10.1109/ICACT.2007.358350
[4]
Cho JS, 2007, PROCEEDINGS OF FUTURE GENERATION COMMUNICATION AND NETWORKING, MAIN CONFERENCE PAPERS, VOL 1, P481
[5]
Design and implementation of PUF-based "Unclonable" RFID ICs for anti-counterfeiting and security applications
[J].
2008 IEEE INTERNATIONAL CONFERENCE ON RFID,
2008,
:58-+
[6]
DIMITRIOU T, 2005, C SEC PRIV EM AR COM
[7]
Feldhofer M., 2005, IEE Proceedings-Information Security, V152, P13, DOI 10.1049/ip-ifs:20055006
[8]
An authentication protocol in a security layer for RFID smart tags
[J].
MELECON 2004: PROCEEDINGS OF THE 12TH IEEE MEDITERRANEAN ELECTROTECHNICAL CONFERENCE, VOLS 1-3,
2004,
:759-762
[9]
Finkenzeller K., 2002, RFID handbook
[10]
Gao XX, 2004, PROCEEDINGS OF THE IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE TECHNOLOGY FOR DYNAMIC E-BUSINESS, P164