共 33 条
- [1] Avoine G, 2005, LECT NOTES COMPUT SC, V3570, P125
- [2] A scalable and provably secure hash-based RFID protocol [J]. Third IEEE International Conference on Pervasive Computing and Communications, Workshops, 2005, : 110 - 114
- [3] AVOINE G, 2005, THESIS ECOLE POLYTEC
- [4] Bondi A. B., 2000, Proceedings Second International Workshop on Software and Performance. WOSP2000, P195, DOI 10.1145/350391.350432
- [5] Burmester M., 2008, International Journal of Applied Cryptography, V1, P79, DOI 10.1504/IJACT.2008.021082
- [6] CAI S, 2009, 2 ACM C WIR NETW SEC, P51
- [8] A lightweight RFID protocol to protect against traceability and cloning attacks [J]. First International Conference on Security and Privacy for Emerging Areas in Communications Networks, Proceedings, 2005, : 59 - 66
- [9] DUC DN, 2006, S CRYPT INF SEC SCIS
- [10] Fouladgar S., 2007, P 1 INT EURASIP WORK, V66, P68