共 14 条
[1]
Ahamed S. I., 2008, 12 IEEE INT WORKSH F
[2]
Public-key cryptography for RFID-tags
[J].
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS,
2007,
:217-+
[3]
Batina L., 2006, An Elliptic Curve Processor Suitable For RFID-Tags
[4]
Braun M., 2008, IJCSNS INT J COMPUTE, V8
[5]
DIMITRIOU T, 2005, C SEC PRIV EM AR COM
[6]
Godor G., 2009, MOMM 2009
[7]
Mutual Authentication Protocol for Low Computational Capacity RFID Systems
[J].
GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE,
2008,
[8]
Gura N, 2004, LECT NOTES COMPUT SC, V3156, P119
[9]
Joye M, 2002, LECT NOTES COMPUT SC, V2523, P291
[10]
Matsumoto M., 1998, ACM Transactions on Modeling and Computer Simulation, V8, P3, DOI 10.1145/272991.272995