共 15 条
- [1] Datasheet Helion Technology, 2005, MD5 SHA 1 SHA 256 HA
- [2] ON THE SECURITY OF PUBLIC KEY PROTOCOLS [J]. IEEE TRANSACTIONS ON INFORMATION THEORY, 1983, 29 (02) : 198 - 208
- [3] Feldhofer M., 2005, IEE Proceedings-Information Security, V152, P13, DOI 10.1049/ip-ifs:20055006
- [4] Fouladgar S., 2007, P 1 INT EURASIP WORK, V66, P68
- [5] Fouladgar S., 2007, J COMMUNICATIONS, V2, P6
- [6] Ha J, 2007, LECT NOTES COMPUT SC, V4809, P795
- [7] Henrici D, 2004, SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, P149
- [8] A New Ultralightweight RFID Protocol with Mutual Authentication [J]. 2009 WASE INTERNATIONAL CONFERENCE ON INFORMATION ENGINEERING, ICIE 2009, VOL II, 2009, : 58 - +
- [9] Lim CH, 2006, LECT NOTES COMPUT SC, V4307, P1
- [10] Molnar D, 2006, LECT NOTES COMPUT SC, V3897, P276