共 14 条
[1]
Alomair B, 2010, I C DEPEND SYS NETWO, P1, DOI 10.1109/DSN.2010.5545008
[2]
Asadpour M., 2011, TECHNICAL REPORT
[3]
Avoine G., 2010, WORKSH RFID SEC
[4]
Avoine G., 2005, TECHNICAL REPORT
[5]
Basin D., 2005, Int J Inf Secur, V4, P181, DOI DOI 10.1007/S10207-004-0055-7
[6]
Camenisch J, 2010, LECT NOTES COMPUT SC, V6371, P198, DOI 10.1007/978-3-642-15898-8_13
[8]
Providing Security and Privacy in RFID Systems Using Triggered Hash Chains
[J].
2008 IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS,
2008,
:50-59
[9]
Henrici Dirk, 2008, LECT NOTES ELECT ENG
[10]
Mödersheim S, 2009, LECT NOTES COMPUT SC, V5789, P337, DOI 10.1007/978-3-642-04444-1_21