On the similarity of commercial EPC Gen2 pseudorandom number generators
暂无分享,去创建一个
[1] Jianfeng Ma,et al. Vulnerability analysis of elliptic curve cryptography‐based RFID authentication protocols , 2012, Trans. Emerg. Telecommun. Technol..
[2] Sven G. Bilen,et al. On cost-sharing mechanisms in cognitive radio networks , 2011, Eur. Trans. Telecommun..
[3] U. Alvarado,et al. Energy harvesting technologies for low‐power electronics , 2012, Trans. Emerg. Telecommun. Technol..
[4] J. M. Seguí. Lightweight PRNG for Low-Cost Passive RFID Security Improvement , 2011 .
[5] Joaquín García,et al. A Practical Implementation Attack on Weak Pseudorandom Number Generator Designs for EPC Gen2 Tags , 2011, Wirel. Pers. Commun..