共 14 条
[1]
Avoine G., RFID SECURITY PRIVAC
[2]
Roadmap to solving security and privacy concerns in RFID systems
[J].
Comput Law Secur Rep,
2007, 6 (555-561)
[3]
Strong crypto for RFID tags - A comparison of low-power hardware implementations
[J].
2007 IEEE INTERNATIONAL SYMPOSIUM ON CIRCUITS AND SYSTEMS, VOLS 1-11,
2007,
:1839-1842
[4]
Fouladgar S., 2007, J COMMUNICATIONS, V2, P6
[6]
RFID protocol enabling ownership transfer to protect against traceability and DoS attacks
[J].
PROCEEDINGS OF THE FIRST INTERNATIONAL SYMPOSIUM ON DATA, PRIVACY, AND E-COMMERCE,
2007,
:508-510
[7]
Molnar D, 2006, LECT NOTES COMPUT SC, V3897, P276
[8]
An efficient and secure RFID security method with ownership transfer
[J].
2006 INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY, PTS 1 AND 2, PROCEEDINGS,
2006,
:1090-1095
[10]
Schneier B, 1995, Applied Cryptography, V2nd