Coma704 发表于 2025-3-28 18:39:35

http://reply.papertrans.cn/83/8207/820617/820617_41.png

MILK 发表于 2025-3-28 21:11:41

http://reply.papertrans.cn/83/8207/820617/820617_42.png

GUMP 发表于 2025-3-29 01:16:27

http://reply.papertrans.cn/83/8207/820617/820617_43.png

名字 发表于 2025-3-29 05:41:48

Deploying OSK on Low-Resource Mobile Devicested to that goal, and many inventive mechanisms have been suggested to achieve it. However, to the best of our knowledge, none of these protocols have been tested so far in practical scenarios. In this paper, we present an implementation of the OSK protocol, a scalable and privacy-friendly authentic

outset 发表于 2025-3-29 10:56:54

Is NFC a Better Option Instead of EPC Gen-2 in Safe Medication of Inpatientsthe medication errors, experienced by many. As UHF Gen-2 tags have limited capacity, cryptographic algorithms cannot be accommodated. The only available functions PRNG and CRC cannot be used instead of cryptographic algorithms. To overcome the known weaknesses, various grouping protocols have been p
页: 1 2 3 4 [5]
查看完整版本: Titlebook: Radio Frequency Identification: Security and Privacy Issues; Security and Privacy Michael Hutter,Jörn-Marc Schmidt Conference proceedings 2