共 32 条
[1]
[Anonymous], 2010, REAL PRIV MAN RPM CR
[2]
[Anonymous], 2008, P 2008 ACM S INFORM
[3]
A scalable and provably secure hash-based RFID protocol
[J].
Third IEEE International Conference on Pervasive Computing and Communications, Workshops,
2005,
:110-114
[4]
Public-key cryptography for RFID-tags
[J].
FIFTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS,
2007,
:217-+
[5]
Batina L., 2006, An Elliptic Curve Processor Suitable For RFID-Tags
[6]
Burmester M, 2008, LECT NOTES COMPUT SC, V5037, P490, DOI 10.1007/978-3-540-68914-0_30
[7]
A Lightweight Authentication Protocol for Low-Cost RFID
[J].
JOURNAL OF SIGNAL PROCESSING SYSTEMS FOR SIGNAL IMAGE AND VIDEO TECHNOLOGY,
2010, 59 (01)
:95-102
[8]
Feldhofer M, 2004, LECT NOTES COMPUT SC, V3156, P357
[9]
Henrici D, 2004, SECOND IEEE ANNUAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, P149
[10]
Proper RFID Privacy: Model and Protocols
[J].
IEEE TRANSACTIONS ON MOBILE COMPUTING,
2014, 13 (12)
:2888-2902