Author:
Sun Degang,Cui Yue,Wang Siye,Zhang Yanfang
Publisher
Springer Nature Switzerland
Reference18 articles.
1. Iso [EB/OL]. https://www.iso.org/home.html
2. Lawson, N.: Side-channel attacks on cryptographic software. IEEE Secur. Priv. 7(6), 65–68 (2009)
3. Maurya, P.K., Bagchi, S.: A secure PUF-based unilateral authentication scheme for RFID system. Wireless Pers. Commun. 103(2), 1699–1712 (2018). https://doi.org/10.1007/s11277-018-5875-2
4. Sharma, V., Vithalkar, A., Hashmi, M.S.: Lightweight security protocol for chipless RFID in internet of things (IoT) applications. In: 2018 10th International Conference on Communication Systems & Networks (COMSNETS) (2018)
5. Weiqing, H., Chang, D., Yue, C., et al.: RFID air port intrusion detection technology based on malicious reader discovery. Acta Sinica Sinica, 7 (2018)