共 39 条
[1]
Akgün M, 2011, LECT NOTES COMPUT SC, V6710, P239, DOI 10.1007/978-3-642-22444-7_16
[2]
[Anonymous], 2008, P 2008 ACM S INFORM
[3]
Impossibility results for RFID privacy notions
[J].
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics),
2010, 6480 (PART 2)
:39-63
[4]
Armknecht F, 2010, LECT NOTES COMPUT SC, V6123, P493, DOI 10.1007/978-3-642-13708-2_29
[5]
Avoine G, 2006, LECT NOTES COMPUT SC, V3897, P291
[6]
Avoine G., 2005, THESIS EPFL
[7]
Avoine G, 2005, 2005049 CRYPT EPRINT
[8]
Avoine G, 2010, LECT NOTES COMPUT SC, V6370, P138, DOI 10.1007/978-3-642-16822-2_13
[9]
Canard S., 2010, 2010 IEEE International Conference on RFID-Technology and Applications (RFID-TA), P269, DOI 10.1109/RFID-TA.2010.5529920
[10]
Chai Q., 2012, THESIS U WATERLOO