共 50 条
- [41] High-efficient RFID Authentication Protocol Based on Physical Unclonable Function 2012 INTERNATIONAL CONFERENCE ON WIRELESS COMMUNICATIONS, NETWORKING AND MOBILE COMPUTING (WICOM), 2012,
- [42] Research and Implementation in RFID Authentication Protocol Based on Bloom Filter 2011 AASRI CONFERENCE ON INFORMATION TECHNOLOGY AND ECONOMIC DEVELOPMENT (AASRI-ITED 2011), VOL 2, 2011, : 4 - 7
- [46] A COLLISION RESISTANCE SECURE HASH ALGORITHM BASED ON A PSEUDO-RANDOM SEQUENCE GENERATOR FOR AUTHENTICATION PROTOCOL JOURNAL OF ENGINEERING SCIENCE AND TECHNOLOGY, 2022, 17 (04): : 2877 - +
- [47] A Survey of RFID Authentication Protocols Based on Hash-Chain Method THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 559 - 564
- [49] A LIGHTWEIGHT RFID AUTHENTICATION PROTOCOL USING PHYSICAL UNCLONABLE FUNCTION 2011 INTERNATIONAL CONFERENCE ON INSTRUMENTATION, MEASUREMENT, CIRCUITS AND SYSTEMS (ICIMCS 2011), VOL 2: FUTURE COMMUNICATION AND NETWORKING, 2011, : 265 - 268
- [50] A Cloud-based RFID Authentication Protocol with Insecure Communication Channels 2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 332 - 339