共 10 条
[1]
[丁振华 Ding Zhenhua], 2009, [计算机研究与发展, Journal of Computer Research and Development], V46, P583
[2]
Ding Zhiguo, 2009, KEY TECHNOLOGY RES I
[3]
Hsin-Ruey Tsai, 2011, Proceedings of the 2011 6th International Conference on Computer Sciences and Convergence Information Technology (ICCIT 2011), P592
[4]
Morshed M. M., 2011, 2011 17th International Conference on Automation and Computing, P51
[5]
Rhee K, 2005, LECT NOTES COMPUT SC, V3450, P70
[6]
Sharaf M., 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), P71, DOI 10.1109/TrustCom.2012.245
[7]
[谢磊 Xie Lei], 2013, [计算机学报, Chinese Journal of Computers], V36, P457
[8]
Xie zhijun, 2012, RFID SENSOR NETWORKS, p[1, 128]
[9]
Yuksel K., 2004, Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications
[10]
Zhang Xuejun, 2012, RFID ANTICOLLISION S