An Authentication Protocol Applied to RFID Security Systems
暂无分享,去创建一个
Hui Li | Yi Wang | Jian He | Xiaoqing Gong
[1] David A. Wagner,et al. Privacy and security in library RFID: issues, practices, and architectures , 2004, CCS '04.
[2] Frank Stajano,et al. The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks , 1999, Security Protocols Workshop.
[3] Simson L. Garfinkel,et al. RFID: Applications, Security, and Privacy , 2005 .
[4] Samir Ranjan Das,et al. Collision avoidance in a dense RFID network , 2006, WiNTECH.
[5] Daniel W. Engels,et al. RFID Systems and Security and Privacy Implications , 2002, CHES.
[6] Andrew S. Tanenbaum,et al. RFID Guardian: A Battery-Powered Mobile Device for RFID Privacy Management , 2005, ACISP.
[7] Ross Stapleton-Gray. Would Macy's Scan Gimbels? Competitive Intelligence and RFID , 2003 .
[8] Xu Jin. INTEGRATED FAST LEAGNING ALGORITHM FOR FEED-FORWARD NEURAL NETWORK , 2003 .
[9] H. Troy Nagle,et al. Performance of the Levenberg–Marquardt neural network training method in electronic nose applications , 2005 .