共 50 条
- [11] On the Security of RFID Authentication Protocols 2015 IEEE INTERNATIONAL CONFERENCE ON ELECTRONICS, COMPUTING AND COMMUNICATION TECHNOLOGIES (CONECCT), 2015,
- [12] Security analysis of two recently proposed RFID authentication protocols FRONTIERS OF COMPUTER SCIENCE IN CHINA, 2011, 5 (03): : 335 - 340
- [13] Security analysis of two recently proposed RFID authentication protocols Frontiers of Computer Science in China, 2011, 5 : 335 - 340
- [14] Security analysis and application of Chebyshev Chaotic map in the authentication protocols Dharminder, Dharminder (manndharminder999@gmail.com), 1600, Taylor and Francis Ltd. (43): : 1095 - 1103
- [15] Security Analysis of Smartphone and Cloud Computing Authentication Frameworks and Protocols IEEE ACCESS, 2018, 6 : 34527 - 34542
- [16] Security problems of RFID authentication protocols PROCEEDINGS OF THE 6TH WSEAS INTERNATIONAL CONFERENCE ON SYSTEM SCIENCE AND SIMULATION IN ENGINEERING (ICOSSSE '07): SYSTEM SCIENCE AND SIMULATION IN ENGINEERING, 2007, : 325 - +
- [17] Security of lightweight mutual authentication protocols JOURNAL OF SUPERCOMPUTING, 2021, 77 (05): : 4565 - 4581
- [18] Security of lightweight mutual authentication protocols The Journal of Supercomputing, 2021, 77 : 4565 - 4581
- [19] Formal Reasoning on Authentication in Security Protocols 2016 IEEE INTERNATIONAL CONFERENCE ON SYSTEMS, MAN, AND CYBERNETICS (SMC), 2016, : 282 - 289