共 50 条
- [31] RFID Authentication Protocol for Low-cost RFID Tags [J]. INFORMATION-AN INTERNATIONAL INTERDISCIPLINARY JOURNAL, 2011, 14 (06): : 2041 - 2060
- [33] Exposing Clone RFID Tags at the Reader [J]. 2013 12TH IEEE INTERNATIONAL CONFERENCE ON TRUST, SECURITY AND PRIVACY IN COMPUTING AND COMMUNICATIONS (TRUSTCOM 2013), 2013, : 1669 - 1674
- [34] A Novel Authentication Protocol Enabling RFID Tags Ownership Transfer [J]. PROCEEDINGS OF 2012 IEEE 14TH INTERNATIONAL CONFERENCE ON COMMUNICATION TECHNOLOGY, 2012, : 855 - 860
- [36] Keeping It Under Control: A New Authentication Scheme for RFID Tags [J]. 2010 5TH INTERNATIONAL ICST CONFERENCE ON COMMUNICATIONS AND NETWORKING IN CHINA (CHINACOM), 2010,
- [38] A solution based on combination of RFID tags and facial recognition for monitoring systems [J]. PROCEEDINGS OF 2018 5TH NAFOSTED CONFERENCE ON INFORMATION AND COMPUTER SCIENCE (NICS 2018), 2018, : 384 - 387
- [39] Security Monitoring System Using Magnetically-Activated RFID Tags [J]. 2020 IEEE SENSORS, 2020,
- [40] Wireless Ice Detection and Monitoring Using Flexible UHF RFID Tags [J]. IEEE SENSORS JOURNAL, 2021, 21 (17) : 18715 - 18724