2Hoda Jannati.Analysis of relay, terrorist fraud and distance fraud attacks on RFID systems[J]. International Journal of Critical Infrastructure . 2015 被引量:1
3Prosanta Gope,Tzonelih Hwang.A realistic lightweight authentication protocol preserving strong anonymity for securing RFID system[J]. Computers & Security . 2015 被引量:1
4Imran Erguler.A potential weakness in RFID-based Internet-of-things systems[J]. Pervasive and Mobile Computing . 2015 被引量:1