共 50 条
- [12] A Note on the Security of Two Improved RFID Protocols ISECURE-ISC INTERNATIONAL JOURNAL OF INFORMATION SECURITY, 2016, 8 (02): : 155 - 160
- [13] A Z based approach to verifying security protocols FORMAL METHODS AND SOFTWARE ENGINEERING, PROCEEDINGS, 2003, 2885 : 375 - 395
- [14] The Simplified Inductive Approach to Verifying Security Protocols PROCEEDINGS OF THE INTERNATIONAL SYMPOSIUM ON ELECTRONIC COMMERCE AND SECURITY, 2008, : 523 - 526
- [17] Security analysis of two lightweight RFID authentication protocols annals of telecommunications - annales des télécommunications, 2014, 69 : 273 - 282
- [18] On the (in)security of two buyer-seller watermarking protocols SECRYPT 2008: PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON SECURITY AND CRYPTOGRAPHY, 2008, : 253 - 260
- [19] Security Analysis of Two Distance-Bounding Protocols RFID: SECURITY AND PRIVACY: 7TH INTERNATIONALWORKSHOP, RFIDSEC 2011, 2012, 7055 : 94 - 107
- [20] Security Analysis and Improvement on Two RFID Authentication Protocols Wireless Personal Communications, 2015, 82 : 21 - 33