[1]
J. Wu and H. Li, A Dominating-Set-Based Routing Scheme in A Hoc Wireless Networks, , Telecomm. SystemsJ., vol. 3, pp.63-84, (2001).
Google Scholar
[2]
Gil Soto Tolosa, Outdoor Lighting Controls, Conference Proceedings of LONWORLD 2005, unpublished, Paris, France, October 20, 20.
Google Scholar
[3]
Thornton F. RFID Security[M]. [S. l. ]: Syngress Publishing, Inc., 2007: 2-40.
Google Scholar
[4]
Molnar D, Soppera A, Wagner D. A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags[C]/Proc. of Conf. on Selected Areas in Cryptography. [S. l. ]: Springer-Verlag, 2005: 276-290.
DOI: 10.1007/11693383_19
Google Scholar
[5]
Wengchuang Wang, Keren Wang. RFID Security protocol base on McEliece[J]. Computer Engineering 2009, 35(8): 171-173.
Google Scholar
[6]
Ryu Eun-Kyung, Takagi Tsuyoshi. A Hybrid Approach for Privacy-preserving RFID Tags[J]. Computer Standards & Interfaces, 2009, 31(4): 812-815.
DOI: 10.1016/j.csi.2008.09.001
Google Scholar
[7]
Golle P, Jakobsson M, Juels A, et al. Universal Re-encryption for Mixnets[C]/Proc. of RSA Conference on Cryptographers' Track. Berlin, Germany: Springer-Verlag, 2004: 163-178.
DOI: 10.1007/978-3-540-24660-2_14
Google Scholar
[8]
Zhanglin Li, Guizhang Lu, Yunwei Xin. secondary encryption technology in the RFID security [J]. Computer Engineering, 2008, 34(3): 160-162.
Google Scholar
[9]
Gong Li, Needham R, Yahalom R. Reasoning About Belief in Cryptographic Protocols[C]/Proc. of 1990 IEEE Symp. on Research in Security and Privacy. Los Alamitos, USA: IEEE Computer Society, 1990: 234-248.
DOI: 10.1109/risp.1990.63854
Google Scholar
[10]
Jinhua Ding, Jintao Li, Bo Feng. RFID security authentication protocol based on Hash function [J]. Computer Research and Development, 2009, 46(4): 583-594.
Google Scholar
[11]
Saito J, Ryou J C, Sakurai K. Enhancing Privacy of Universal Re-encryption Scheme for RFID Tags[C]/Proc. of International Conference on Embedded and Ubiquitous Computing. Berlin, Germany: Springer-Verlag, 2004: 879-890.
DOI: 10.1007/978-3-540-30121-9_84
Google Scholar