共 4 条
[2]
RFID malware: Design principles and examples[J] . Melanie R. Rieback,Patrick N.D. Simpson,Bruno Crispo,Andrew S. Tanenbaum.Pervasive and Mobile Computing . 2006 (4)
[3]
Universal Hashing for Ultra-low-power CryptographicHardware Applications .2 Yüksel K. Worcester PolytechnicInstitute . 2004
[4]
Alightweight RFID protocol to protect against traceability and cloning attacks .2 Di mitriou T. Proc of the1st Int Conf on Security and Privacy for Emerging Areas in Communications Networks . 2005