3Lim C H, Kwon T. Strong and robust RFID authentication enabling perfect ownership transfer[C]. Proceedings of the Conference on Information and Communications Security,North Carolina, USA, 2006: 1-20.
4Sharkey J, Balkan D, Ponomarev D. Adaptive Reorder Buffers for SMT Processors[C]. Proceedings of the 15th International Conference on Parallel Architectures and Compilation Techniques Seattle, Washington, 2006.
5Lindell Y. General composition and universal composabitity in secure multi-party computation[C]. Proceedings of the 44nd IEEE Symposium on Foundations of Computer Science,Cambridge,USA, 2003:394-403.
6Martinez M J, Harbour M G. A fixed--priority real time communication protocol over standard Ethernet[C]. Proceedings of the 10th Ada-Europe International Conference on Reliable Software Technologies,New York, 2005:180-195.
7Parunak H Van Dyke, Brueckner Sven, Savit Robert. Universality in multi-Agent systems[C]. Proceedings of the 3rd International Joint Conference on Autonomous Agents and Multiagent Systems, New York,2004:930-937.
8Palmer D, Kirschenbaum M, Seiter L. Emergence-oriented programming[C]. Proceedings of the International Conference on Systems, Man, and Cybernetics,Hawaii, 2005:1441-1448.