Author:
Shi Zhicai,Wu Fei,Wang Changzhi,Ren Shitao
Publisher
Springer International Publishing
Reference20 articles.
1. Chen, M., Luo, W., Mo, Z., Chen, S., Fang, Y.: An efficient tag search protocol in large-scale RFID systems with noisy channel. IEEE/ACM Trans. Netw. 24(2), 703–716 (2016)
2. Lecture Notes in Computer Science;P Peris-Lopez,2006
3. Chikouche, N., Cherif, F., Cayrel, P.-L.: Weaknesses in two RFID authentication weaknesses. In: El Hajji, S., et al. (eds.) C2SI 2015, LNCS, vol. 9084, pp. 162–172. Springer, Heidelberg (2015)
4. Lecture Notes in Computer Science;RH Deng,2010
5. Weis, S.A., Sarma, S.E., Rivest, R.L., Engels, D.W.: Security and privacy aspects of low-cost radio frequency identification systems. In: Proceedings of the 1st International Conference on Security in Pervasive Computing, Boppard, Germany, pp. 201–212 (2003)
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献