RFID protocol evaluation using Bayesian networks
暂无分享,去创建一个
[1] Hartmut Pohl,et al. RFID security , 2004, Inf. Secur. Tech. Rep..
[2] Dong Hoon Lee,et al. Efficient RFID Authentication Protocol for Ubiquitous Computing Environment , 2005, EUC Workshops.
[3] Mike Burmester,et al. RFID Security : Attacks , Countermeasures and Challenges , 2007 .
[4] Egils Ginters,et al. Security problems of RFID authentication protocols , 2007 .
[5] Julien Bringer,et al. HB^+^+: a Lightweight Authentication Protocol Secure against Some Attacks , 2006, Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing (SecPerU'06).
[6] Tim Kerins,et al. Public-Key Cryptography for RFID-Tags , 2007, Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07).
[7] Yingjiu Li,et al. Protecting RFID communications in supply chains , 2007, ASIACCS '07.