共 50 条
- [21] Algebraic Replay Attacks on Authentication in RFID Protocols ADVANCES IN SECURITY OF INFORMATION AND COMMUNICATION NETWORKS, 2013, 381 : 153 - +
- [22] Passive attacks on a class of authentication protocols for RFID INFORMATION SECURITY AND CRYPTOLOGY - ICISC 2007, 2007, 4817 : 102 - 115
- [23] A Chaotic Map-based Authentication Scheme for Telecare Medicine Information Systems Journal of Medical Systems, 2013, 37
- [24] PUF and Chaotic Map-Based Authentication Protocol for Underwater Acoustic Networks APPLIED SCIENCES-BASEL, 2024, 14 (13):
- [25] Desynchronization attacks on RFID security protocols Deng, M. (dmlei2003@163.com), 1600, Universitas Ahmad Dahlan (11):
- [27] DOS Attacks on Varying Pseudonyms-Based RFID Authentication Protocols 2008 IEEE ASIA-PACIFIC SERVICES COMPUTING CONFERENCE, VOLS 1-3, PROCEEDINGS, 2008, : 615 - 622
- [28] Provably secure extended chaotic map-based three-party key agreement protocols using password authentication Nonlinear Dynamics, 2015, 82 : 29 - 38
- [29] Enhancing the security of FinTech applications with map-based graphical password authentication FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2019, 101 : 1018 - 1027