-
1
-
-
62349142633
-
-
GA36-2007:vehicle license plate national standard of the People's Republic of China
-
GA36-2007:vehicle license plate national standard of the People's Republic of China, http://bbs.xbus.cn/thread-35753-1-2.html
-
-
-
-
2
-
-
2542625540
-
Color and Texture Analysis Based Vehicle License Plate Location [J]
-
GUO Jie, SHI Peng-fei. Color and Texture Analysis Based Vehicle License Plate Location [J]. Journal of Image and Graphics (A), 2002, 7(5):472-476
-
(2002)
Journal of Image and Graphics (A)
, vol.7
, Issue.5
, pp. 472-476
-
-
Jie, G.U.O.1
Peng-fei, S.H.I.2
-
4
-
-
35048876270
-
Security and privacy aspects of low-cost radio frequency identification systems
-
Hutter D. Miller G, Stephan W, Ullmann M. eds, Berlin:Springer-Verlag
-
Weis S. A., Sarma S. E., Rivest R. L., Engels D. W., Security and privacy aspects of low-cost radio frequency identification systems. In:Hutter D. Miller G., Stephan W., Ullmann M. eds. Proceedings of the 1st International Conference on Security in Pervasive Computing. Lectures Notes in Computer Science 2802. Berlin:Springer-Verlag, 2004, 201-212
-
(2004)
Proceedings of the 1st International Conference on Security in Pervasive Computing. Lectures Notes in Computer Science
, vol.2802
, pp. 201-212
-
-
Weis, S.A.1
Sarma, S.E.2
Rivest, R.L.3
Engels, D.W.4
-
5
-
-
18744409344
-
-
Juels A., Rivest R. L., Szydlo M., The blocker tag:Selective blocking of RFID tags for consumer Privacy. In:Proceedings of the 10th ACM Conference on Computer and Communications Security(CCS 2003), Washington, DC, USA, 2003, 103-111
-
Juels A., Rivest R. L., Szydlo M., The blocker tag:Selective blocking of RFID tags for consumer Privacy. In:Proceedings of the 10th ACM Conference on Computer and Communications Security(CCS 2003), Washington, DC, USA, 2003, 103-111
-
-
-
-
6
-
-
35248872610
-
RFID systems and security and privacy implications [A]
-
Kaliski B. S, Koc C. K, Paar C. eds, Berlin: Springer-Verlag
-
Sarma S. E., Weis S. A., Engels D. W., RFID systems and security and privacy implications [A]. In: Kaliski B. S., Koc C. K., Paar C. eds. Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems(CHES 2002)[C]. Lectures Notes in Computer Science 2523. Berlin: Springer-Verlag, 2003, 454-469
-
(2003)
Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems(CHES 2002)[C]. Lectures Notes in Computer Science
, vol.2523
, pp. 454-469
-
-
Sarma, S.E.1
Weis, S.A.2
Engels, D.W.3
-
7
-
-
33744950331
-
Hash-chain based for-ward-secure privacy protection scheme for low-cost RFID[A]
-
Sendai
-
Ohkubo M., Suzuki K., Kinoshita S., Hash-chain based for-ward-secure privacy protection scheme for low-cost RFID[A]. In: Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004)[C], Sendai, 2004, 719-724
-
(2004)
Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS
, vol.100
, pp. 719-724
-
-
Ohkubo, M.1
Suzuki, K.2
Kinoshita, S.3
-
8
-
-
2942625823
-
Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers[A]
-
Washington, DC, USA
-
Henrici D., Muller P., Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers[A]. In: Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops(PERCOMW'04)[C], Washington, DC, USA, 2004, 149-153
-
(2004)
Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops(PERCOMW'04)[C]
, pp. 149-153
-
-
Henrici, D.1
Muller, P.2
-
9
-
-
24644501824
-
Challenge-response based RFID authentication protocol for distributed database environment[A]
-
Hutter D, Ullmann M. eds, Berlin: Springer2Verlag
-
Rhee K., Kwak J., Kim S., Won D., Challenge-response based RFID authentication protocol for distributed database environment[A]. In: Hutter D., Ullmann M. eds., Proceedings of the 2nd International Conference on Security in Pervasive Computing (SPC 2005) [C]. Lectures Notes in Computer Science 3450. Berlin: Springer2Verlag, 2005, 70-84
-
(2005)
Proceedings of the 2nd International Conference on Security in Pervasive Computing (SPC 2005) [C]. Lectures Notes in Computer Science
, vol.3450
, pp. 70-84
-
-
Rhee, K.1
Kwak, J.2
Kim, S.3
Won, D.4
-
10
-
-
35048904109
-
-
Saito J., Ryou J. C., Sakurai K., Enhancing privacy of universal reencryption scheme for RFID tags[A]. In: Yang L. T., Guo M., Gao G. R., J ha N. K. eds., Proceedings of t he International Conference on Embedded and Ubiquitous Computing (EUC 2004)[C]. Lectures Notes in Computer Science 3207. Berlin: Springer-Verlag, 2004, 879-890
-
Saito J., Ryou J. C., Sakurai K., Enhancing privacy of universal reencryption scheme for RFID tags[A]. In: Yang L. T., Guo M., Gao G. R., J ha N. K. eds., Proceedings of t he International Conference on Embedded and Ubiquitous Computing (EUC 2004)[C]. Lectures Notes in Computer Science 3207. Berlin: Springer-Verlag, 2004, 879-890
-
-
-
-
11
-
-
35248832722
-
Squealing Euros:Privacy protection in RFID-enabled banknotes
-
Wright R. N. ed, Berlin:Springer-Verlag
-
Juels A., Pappu R., Squealing Euros:Privacy protection in RFID-enabled banknotes. In:Wright R. N. ed., Proceedings of the 7th International Conference on Financial Cryptopgrahy(FC'03). Lectures Notes in Computer Science 2742. Berlin:Springer-Verlag, 2003, 103-121
-
(2003)
Proceedings of the 7th International Conference on Financial Cryptopgrahy(FC'03). Lectures Notes in Computer Science
, vol.2742
, pp. 103-121
-
-
Juels, A.1
Pappu, R.2
-
12
-
-
62349137277
-
-
R. Rivest, The MD5 Message-Digest Algorithm, ftp://ftp.isi.edu/innotes/ rfc1321.txt, April 1992.
-
R. Rivest, The MD5 Message-Digest Algorithm, ftp://ftp.isi.edu/innotes/ rfc1321.txt, April 1992.
-
-
-
|