[1] |
JUELS A.RFID Security and Privacy: A Research Survey[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 381-394.
|
[2] |
LEE H, KIM J.Privacy Threats and Issues in Mobile RFID[C]//IEEE. Availability, Reliability and Security, 2006. ARES 2006. The First International Conference on, April 20-22,2006. Vienna, Austria.NJ:IEEE, 2006: 5.
|
[3] |
PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, ESTEVEZ-TAPIADOR J M, et al. M2AP: A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags[EB/OL]. 2017-3-12.
|
[4] |
PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, ESTEVEZ-TAPIADOR J M, et al. EMAP: An Efficient Mutual-Authentication Protocol for Low-Cost RFID Tags[A]//On the Move to Meaningful Internet Systems 2006: OTM 2006 Workshops[M]. Heidelberg :Springer Berlin Heidelberg, 2006: 352-361.
|
[5] |
PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, ESTEVEZ-TAPIADOR J M, et al. LMAP: A Real Light-Weight Mutual Authentication Protocol for Low-Cost RFID Tags[EB/OL]. 2017-3-12.
|
[6] |
CHIEN H Y.SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity[J]. IEEE Transactions on Dependable and Secure Computing, 2007, 4(4): 337-340.
|
[7] |
蒋政君,田海博,张方国.基于PUF的RFID防伪技术研究综述[J]. 信息网络安全,2016(4):38-43.
|
[8] |
PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, ESTEVEZ-TAPIADOR J M, et al. Advances in Ultralight-Weight Cryptography for Low-cost RFID Tags: Gossamer Protocol[C]// Information Security Applications, International Work-Shop. Wisa 2008, September 23-25, 2008.Jeju Island, Korea. Heidelberg:Springer-Verlag Berlin,2008: 56-68.
|
[9] |
AHMED E G, SHAABAN E, HASHEM M.Lightweight Mutual Authentication Protocol for Low Cost RFID Tags[J]. International Journal of Network Security & Its Applications, 2010, 2(2):27-37.
|
[10] |
LEE Y C, HSIEH Y C, YOU P S, et al.A New Ultralightweight RFID Protocol with Mutual Authentication[C]//IEEE.Information Engineering, 2009. ICIE’09. WASE International Conference on. July 10-11, 2009. Taiyuan, China.NJ: IEEE, 2009: 58-61.
|
[11] |
PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, ESTEVEZ-TAPIADOR J M, et al. Security Flaws in a Recent Ultralightweight RFID Protocol[EB/OL].2017-3-12.
|
[12] |
TIAN Yun, CHEN Gongliang, LI Jianhua.A New Ultralightweight RFID Authentication Protocol with Permutation[J]. IEEE Communications Letters, 2012, 16(5):702-705.
|
[13] |
马庆,郭亚军,曾庆江,等.一种新的超轻量级RFID双向认证协议[J]. 信息网络安全,2016(5):44-50.
|
[14] |
CHEN Yalin, CHOU J S, SUN H M.A Novel Mutual Authentication Scheme Based on Quadratic Residues for RFID Systems[J]. Computer Networks, 2008, 52(12):2373-2380.
|
[15] |
YEH T C, WU C H, TSENG Y M.Improvement of the RFID Authentication Scheme Based on Quadratic Residues[J]. Computer Communications, 2011, 34(3):337-341.
|
[16] |
DOSS R, SUNDARESAN S, ZHOU Wanlei.A Practical Quadratic Residues-based Scheme for Authentication and Privacy in Mobile RFID Systems[J]. Ad Hoc Networks, 2013, 11(1):383-396.
|
[17] |
NIU Ben, ZHU Xiayan, CHI Haotian, et al.Privacy and Authentication Protocol for Mobile RFID Systems[J]. Wireless Personal Communications, 2014, 77(3):1713-1731.
|
[18] |
梁颖升,王琼霄,马存庆,等. 一种基于移动终端的可信消息传输方案设计[J]. 信息网络安全,2015(9):158-162.
|
[19] |
LIU A X, BAILEY L A.PAP: A Privacy and Authentication Protocol for Passive RFID Tags[J]. Computer Communications, 2009, 32(7-10):1194-1199.
|
[20] |
KULSENG L, YU Zhen, WEI Yawen, et al.Lightweight Mutual Authentication and Ownership Transfer for RFID Systems[C]// IEEE. INFOCOM, 2010 Proceedings IEEE, March 14 - 19, 2010. San Diego, California, USA.NJ:IEEE, 2010:1-5.
|
[21] |
CHO J S, YEO S S, KIM S K.Securing against Brute-force Attack: A Hash-based RFID Mutual Authentication Protocol Using a Secret Value[J]. Computer Communications, 2011, 34(3):391-397.
|
[22] |
LIU A T, CHANG K C, LO Y S,et al.The Increase of RFID Privacy and Security with Mutual Authentication Mechanism in Supply Chain Management[J]. International Journal of Electronic Business Management, 2012, 10(1):1-7.
|
[23] |
MORSHED M, ATKINS A, YU Hongnian.An Efficient and Secure Authentication Protocol for RFID Systems[J]. International Journal of Automation and Computing , 2012,9(3):257-265.
|
[24] |
CHANG Yafen, LIN S C, CHANG Panyu.A Location-Privacy-Protected RFID Authentication Scheme[C]//IEEE. Communications (ICC), 2011 IEEE International Conference on, June 5-9, 2011. Kyoto, Japan.NJ:IEEE, 2011:1-4.
|