共 17 条
- [1] Ateniese G., 2005, Proc. ACM Conf. on Computer and Communication Security (ACM CCS 2005), P92, DOI DOI 10.1145/1102120.1102134.19
- [2] A scalable and provably secure hash-based RFID protocol [J]. Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 110 - 114
- [3] A lightweight RFID protocol to protect against traceability and cloning attacks [J]. First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, : 59 - 66
- [4] *EPCGLOBAL, SEPC RFID AIR INT
- [5] Feldhofer M, 2004, LECT NOTES COMPUT SC, V3156, P357
- [6] Golle P, 2004, LECT NOTES COMPUT SC, V2964, P163
- [7] Henrici D, 2004, SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, P149
- [8] *ISO IEC, 8000 ISOIEC
- [10] JUELS A, 2004, LECT NOTES COMPUTER, V3352, P149, DOI DOI 10.1007/B105083