[1]
Yang Geng, Xu Jian, Chen Wei. Security features and key technology of the Internet of things [J]. Journal of Nanjing University of Posts and Telecommunications (NATURAL SCIENCE EDITION) ,2010,30(04):20-29.
Google Scholar
[2]
Wang He, Yang Hua, Gao Fubing. Security [J]. Sichuan ordnance Journal of Internet of things, 2011, (11) :90-91.
Google Scholar
[3]
Hao Wenjiang. Technical security issues of [J]. Network information security of Internet of things, (01), 2010, pp.49-50.
Google Scholar
[4]
Dirk H. RFID Security and Privac: Concepts, Protcols, and Architectures. Berlin: Springer, 2008, pp.107-137.
Google Scholar
[5]
Juels A. RFID Security and Privacy: A Research Survey. Selected Areas in communication, 24(2), 2006, pp.381-394.
DOI: 10.1109/jsac.2005.861395
Google Scholar
[6]
Fu Rong. Network research and implementation of [D] security and privacy protection platform sharing, Beijing Jiaotong University. (2011).
Google Scholar
[7]
Diffie W, Hellman M. New Direction in Cryptography. IEEE Transaction on Information Theory, 6(22), 1976, pp.644-654.
DOI: 10.1109/tit.1976.1055638
Google Scholar
[8]
Kohnfelder L M. towards a Practical Public-key Cryptosystem. MIT B.S. Thesis, MIT Department of Electrical Engineering, (1978).
Google Scholar
[9]
Chang C, Lin C. An ID-based Signature Scheme Based upon Rabin's Public Key Cryptosystem. Proceedings of 25th Annual IEEE International Carnahan Conference on Security Technology, 1991, pp.139-141.
DOI: 10.1109/ccst.1991.202205
Google Scholar
[10]
Yang Yixian, Niu Xinxin. Application of cryptography. Beijing University of Posts and Telecommunications press, (2005).
Google Scholar