共 21 条
[1]
Ahson S. A., 2008, RFID Handbook: Applications, Technology, Security, and Privacy
[2]
Avoine G, 2009, LECT NOTES COMPUT SC, V5735, P250, DOI 10.1007/978-3-642-04474-8_21
[3]
Bicakci K, 2005, LECT NOTES COMPUT SC, V3813, P80
[4]
Brands S., 1993, LECT NOTES COMPUTER, P344, DOI [DOI 10.1007/3-540-48285-7_30, 10.1007/3-540-48285-7_30]
[5]
Capkun S., 2003, ACM WORKSHOP SECURIT, P21
[6]
Clulow J, 2006, LECT NOTES COMPUT SC, V4357, P83
[7]
Conway J.H., 1976, On Numbers and Games
[8]
Daemen Joan, 2020, Information Security and Cryptography, V2nd
[9]
DESMEDT Y, 1988, LECT NOTES COMPUT SC, V293, P21