共 11 条
[1]
RFID Security without Ex-tensive Cryptography. Karthikeyan S,Nesterenko M. Proceedings of the 3rd ACMWorkshop on Security of ad hoc and SensorNetworks . 2005
[3]
射频识别(RFID)系统设计、仿真与应用[M]. 人民邮电出版社 , 周晓光, 2008
[4]
Uni-versally composable and forward-secure RFID authentication and au-thenticated key exchange. van LE T,MIKE BURNMESTER,BRENO DE MEDEIROS. Proceedings of the Second ACMSymposium on Information.Computer and Communications Security . 2007
[5]
Defending RFID authentication protocol against DoSattacks. DUC D N,KIM K. Computer Communications . 2011
[8]
Adversarial model for radio frequency identification. AVOINE G. http://eprint.Ia-cr.org . 2010
[9]
Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards. Chien Hungyu,Chen Chehao. Computers and Standards . 2007
[10]
"Vulnerability of an RFID authentication protocol conforming to EPC Class 1 Generation 2 Standards". D Han,D Kwon. Computers and Standards . 2009