共 33 条
[1]
Avoine G, 2005, LECT NOTES COMPUT SC, V3570, P125
[2]
A scalable and provably secure hash-based RFID protocol
[J].
Third IEEE International Conference on Pervasive Computing and Communications, Workshops,
2005,
:110-114
[3]
AVOINE G, 2005, THESIS ECOLE POLYTEC
[4]
Bondi A. B., 2000, Proceedings Second International Workshop on Software and Performance. WOSP2000, P195, DOI 10.1145/350391.350432
[5]
Burmester M., 2008, International Journal of Applied Cryptography, V1, P79, DOI 10.1504/IJACT.2008.021082
[6]
CAI S, 2009, 2 ACM C WIR NETW SEC, P51
[8]
A lightweight RFID protocol to protect against traceability and cloning attacks
[J].
First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings,
2005,
:59-66
[9]
DUC DN, 2006, S CRYPT INF SEC SCIS
[10]
Fouladgar S., 2007, P 1 INT EURASIP WORK, V66, P68