Cited By
View all- Sun YWu TMa XChao H(2015)Modeling and verifying EPC network intrusion system based on timed automataPervasive and Mobile Computing10.1016/j.pmcj.2015.06.00724:C(61-76)Online publication date: 1-Dec-2015
- Abawajy JFernando H(2015)Policy-based SQLIA detection and prevention approach for RFID systemsComputer Standards & Interfaces10.1016/j.csi.2014.08.00538:C(64-71)Online publication date: 1-Feb-2015
- Avoine GCoisel IMartin TKrunz MLazos LDi Pietro RTrappe W(2012)A privacy-restoring mechanism for offline RFID systemsProceedings of the fifth ACM conference on Security and Privacy in Wireless and Mobile Networks10.1145/2185448.2185458(63-74)Online publication date: 16-Apr-2012
- Show More Cited By