Author:
Ma Hongyang,Chen Bingquan
Publisher
Springer Science and Business Media LLC
Subject
Electrical and Electronic Engineering,Computer Science Applications
Reference15 articles.
1. Phillips, T., Karygiannis, T., & Kuhn, R. (2005). Security standards for the RFID market. IEEE Security Privacy, 3(6), 85–89.
2. Zuo, Y. (2010). Survivable RFID systems: Issues, challenges, and techniques. IEEE Transactions on Systems Man and Cybernetics Part C (Applications and Reviews), 40, 406–418.
3. Vahedi, E., Shah-Mansouri, V., Wong, V. W. S., Blake, I. F., & Ward, R. K. (2011). Probabilistic analysis of blocking attack in RFID systems. IEEE Transactions on Information Forensics and Security, 6, 803–817.
4. Yang, P., Wu, W., Moniri, M., & Chibelushi, C. C. (2013). Efficient object localization using sparsely distributed passive RFID tags. IEEE Transactions on Industrial Electronics, 60, 5914–5924.
5. Sato, Y., Mitsugi, J., Nakamura, O., & Murai, J. (2012). Theory and performance evaluation of group coding of RFID tags. IEEE Transactions on Automation Science and Engineering, 9, 458–466.
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献