共 45 条
[4]
Vulnerabilities of RFID Security Protocol Based on Chaotic Maps
[J].
2014 IEEE 22ND INTERNATIONAL CONFERENCE ON NETWORK PROTOCOLS (ICNP),
2014,
:648-653
[5]
[Anonymous], 2015, Emergency response workers and employers
[6]
Bagheri M, 2019, DESIGNING LIGHTWEIGH