3J MYUNG,W LEE. Adaptive Splitting Protocols for RFID tag col- lision arbitration[C]. In Proceeding of International Symposium on Mobile Ad Hoc Networking and Computing,2006.
4P FLAJOLET , G N MARTIN. Probabilistic counting algorithms for data base applications[J]. Journal of Computer and System Sci- ence, 1985(31).
5BURMESTER M LET , MEDEIROS B. Provably secure ubiquito us systems: universally composable RFID authentication protocols [C]. Proceedings of the Conference on Security and Privacy in Communication Networks (SECURECOMM). Baltimore, Mary- land, USA, 2006 : 1-9.
6KITSOS P, KOUFOPAVIOU O. Efficient architecture and hard- ware implementation of the whirlpool hash function [J]. IEEE Transactions on Consumer Electronics, 2004 (2) : 208-213.