共 18 条
- [11] Lim CH, 2006, LECT NOTES COMPUT SC, V4307, P1
- [12] Osaka K., 2009, RFID SECURITY, P147
- [13] Vulnerability analysis of RFID protocols for tag ownership transfer [J]. COMPUTER NETWORKS, 2010, 54 (09) : 1502 - 1508
- [14] Saito J, 2005, LECT NOTES COMPUT SC, V3823, P1303
- [15] Song B., 2008, P C RFID SEC BUD
- [17] Security and privacy aspects of low-cost Radio Frequency Identification systems [J]. SECURITY IN PERVASIVE COMPUTING, 2004, 2802 : 201 - 212
- [18] Yin X., 2011, IEEE GLOBECOM UNPUB