共 50 条
- [41] HASH-BASED ALGORITHMS FOR DISCRETIZED DATA SIAM JOURNAL ON SCIENTIFIC COMPUTING, 2013, 35 (04): : C346 - C368
- [42] Research on RFID Security Authentication Protocol Based on HASH Function 2018 INTERNATIONAL CONFERENCE ON ELECTRICAL, CONTROL, AUTOMATION AND ROBOTICS (ECAR 2018), 2018, 307 : 251 - 255
- [43] A Survey of RFID Authentication Protocols Based on Hash-Chain Method THIRD 2008 INTERNATIONAL CONFERENCE ON CONVERGENCE AND HYBRID INFORMATION TECHNOLOGY, VOL 2, PROCEEDINGS, 2008, : 559 - 564
- [44] An Improvement RFID Security Authentication Protocol Based on Hash Function INNOVATIVE MOBILE AND INTERNET SERVICES IN UBIQUITOUS COMPUTING, IMIS-2018, 2019, 773 : 375 - 384
- [45] State Management for Hash-Based Signatures SECURITY STANDARDISATION RESEARCH, SSR 2016, 2016, 10074 : 244 - 260
- [46] A Secure and Scalable Identification for Hash-based RFID Systems Using Updatable Pre-computation WISEC 10: PROCEEDINGS ON THE THIRD ACM CONFERENCE ON WIRELESS NETWORK SECURITY, 2010, : 65 - 74
- [47] Global Optimization for Hash-based Splitting 2016 IEEE GLOBAL COMMUNICATIONS CONFERENCE (GLOBECOM), 2016,
- [48] A Hash-Based Public Key Cryptosystem CLOUD COMPUTING AND SECURITY, PT III, 2018, 11065 : 383 - 392
- [49] Hash-Based Direct Anonymous Attestation POST-QUANTUM CRYPTOGRAPHY, PQCRYPTO 2023, 2023, 14154 : 565 - 600