Subject
Computer Networks and Communications,Hardware and Architecture,Software
Reference51 articles.
1. K. Bu, X. Liu, B. Xiao, Fast cloned-tag identification protocols for large-scale RFID systems, in: IEEE/ACM IWQoS, 2012, pp. 1–4.
2. RFID security and privacy: a research survey;Juels;IEEE Journal on Selected Areas in Communications,2006
3. Security and privacy aspects of low-cost radio frequency identification systems;Weis;Security in Pervasive Computing, Lecture Notes in Compute Science,2004
4. C. Fan, S. Huang, RFID authentication protocol in supply chains, in: The 3rd Joint Workshop on Information Security, 2008.
5. F. Kerschbaum, A. Sorniotti, RFID-based supply chain partner authentication and key agreement, in: ACM WiSec, 2009, pp. 41–50.
Cited by
17 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献