共 42 条
[21]
Juels A, 2005, LECT NOTES COMPUT SC, V3352, P149
[22]
Defining strong privacy for RFID (Extended abstract)
[J].
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS,
2007,
:342-+
[23]
Kavun EB, 2010, LECT NOTES COMPUT SC, V6370, P258, DOI 10.1007/978-3-642-16822-2_20
[25]
Kodialam M, 2006, MOBICOM 2006, P322
[26]
Lim TL, 2009, LECT NOTES COMPUT SC, V5487, P406, DOI 10.1007/978-3-642-01440-6_30
[27]
Lu L., 2010, Proc. of IEEE INFOCOM, P1
[28]
Dynamic key-updating: Privacy-preserving authentication for RFID systems
[J].
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS, PROCEEDINGS,
2007,
:13-+
[29]
ACTION: Breaking the Privacy Barrier for RFID Systems
[J].
IEEE INFOCOM 2009 - IEEE CONFERENCE ON COMPUTER COMMUNICATIONS, VOLS 1-5,
2009,
:1953-1961
[30]
Ma CS, 2009, CCS'09: PROCEEDINGS OF THE 16TH ACM CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, P54