[1] |
张平, 李建武, 冯志勇 ,等. 认知无线网络基础理论与关键技术研究[J]. 电信科学, 2014,30(2): 1-13.
|
|
ZHANG P , LI J W , FENG Z Y ,et al. Research on basic theory and key technology of cognitive radio network[J]. Telecommunications Science, 2014,30(2): 1-13.
|
[2] |
方箭, 王坦, 黄标 . 高频段宽带无线通信前瞻[J]. 电信科学, 2014,30(3): 109-113.
|
|
FANG J , WANG T , HUANG B . Outlook of broadband wireless communications at high frequency bands[J]. Telecommunications Science, 2014,30(3): 109-113.
|
[3] |
冯剑, 王平阳, 王琳 ,等. 基于能量获取的无线通信系统研究[J]. 电信科学, 2015,31(2): 124-131.
|
|
FENG J , WANG P Y , WANG L ,et al. Research on energy harvesting communication system[J]. Telecommunications Science, 2015,31(2): 124-131.
|
[4] |
郁昱, 李祥学 . 基于单向函数的伪随机产生器与通用单向哈希函数[J]. 西安邮电大学学报, 2016,21(2): 1-9.
|
|
YU Y , LI X X . One-way function based pseudorandom generator and universal one-way hash function[J]. Journal of Xi’an University of Posts and Telecommunications, 2016,21(2): 1-9.
|
[5] |
徐津, 温巧燕 . 消息认证码的理论研究[D]. 北京:北京邮电大学, 2015.
|
|
XU J , WEN Q Y . Theoretical research on message authentication codes[D]. Beijing:Beijing University of Posts and Telecommunications, 2015.
|
[6] |
EPC global EPC “radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860 MHz-960 MHz version 1.2.0[EB/OL].(2013-03-10)[2017-01-05]. .
|
[7] |
YEH T C , WU C H , TSENG Y M . Improvement of the RFID authentication scheme based on quadratic residues[J]. Computer Communications, 2011,34(3): 337-341.
|
[8] |
CHANG P , . A location-privacy-protected RFID authentication scheme[C]// The 2011 IEEE International Conference on Communications,August 1-3,2011,Chengdu,China. New Jersey:IEEE Press, 2011: 1-4.
|
[9] |
ZHOU J . A quadratic residue-based lightweight RFID mutual authentication protocol with constant-time identification[J]. Journal of Communications, 2015,10(2).
|
[10] |
NIU B , ZHU X , CHI H ,et al. Privacy and authentication protocol for mobile RFID systems[J]. Wireless Personal Communications, 2014,77(3): 1-19.
|
[11] |
张琪, 梁向前, 位书敏 . 基于伪随机函数的移动射频识别认证协议[J]. 计算机应用, 2015,35(4): 977-980.
|
|
ZHANG Q , LIANG X Q , WEI S M . Authentication protocol based on pseudo-random function for mobile radio frequency identification[J]. Journal of Computer Applications, 2015,35(4): 977-980.
|
[12] |
DOSS R , ZHOU W L , YU S . Secure RFID tag ownership transfer based on quadratic residues[J]. IEEE Transactions on Information Forensics and Security, 2013,8(2): 390-401.
|
[13] |
WU X Q , ZHANG M , YANG X L . Time-stamp based mutual authentication protocol for mobile RFID system[C]// Wireless and Optical Communication Conference(WOCC),May 16-18,2013,Chongqing,China. New Jersey:IEEE Press, 2013: 702-706.
|
[14] |
杜宗印, 章国安, 袁红林 . 基于位替换运算的RFID双向认证协议[J]. 电视技术, 2013,37(19): 134-137.
|
|
DU Z Y , ZHANG G A , YUAN H L . Bits substitution based on RFID mutual authentication protocol[J]. Video Engineering, 2013,37(19): 134-137
|
[15] |
侯峻峰, 黄连生 . 安全协议形式化验证方法和安全协议设计研究[D]. 北京:清华大学, 2004.
|
|
HOU J F , HUANG L S . Research on formal verification and design of security protocols[D]. Beijing:Tsinghua University, 2004.
|