[1] |
ZANG Zhicheng. JIA Qiang, WANG Xuqiang, et al. The Application of SM7 Built-in Algorithm in Safety Appliance Management[C]// China Electric Power Research Institute. Proceedings of the 2018 Smart Grid New Technology Development and Application Symposium, December 25, 2018, Nanjing, Jiangsu, China. Beijing: China Electric Power Research Institute, 2018: 122-126.
|
|
臧志成, 贾强, 王旭强, 等. 内置SM7算法的RFID在安全工器具管理中的应用[C]// 中国电力科学研究院. 2018智能电网新技术发展与应用研讨会,2018-12-25,中国江苏南京. 北京:中国电力科学研究院, 2018: 122-126.
|
[2] |
KONG Fanyue. Research on Anti-collision Algorithm and Security Authentication Protocol of RFID System[D]. Changchun: Jilin University, 2019.
|
|
孔繁月. RFID系统防碰撞算法及安全认证协议研究[D]. 长春:吉林大学, 2019.
|
[3] |
SARMA S E, WEIS S A, ENGELS D W. RFID Systems and Security and Privacy Implications[C]// Springer. 4th International Workshop on Cryptographic Hardware and Embedded Systems, August 13-15, 2002, Redwood Shores, CA, USA. Berlin: Springer Verlag, 2003: 454-469.
|
[4] |
OHKUBO M, SUZUKI K, KINOSHITA S. Hash-Chain based Forward Secure Privacy Protection Scheme for Low-cost RFID[C]// Springer. Proceedings of the 2004 Symposium on Cryptograph and Information Security, January 27-30, 2004, Sendai, Japan. Berlin: Springer Verlag, 2004: 719-724.
|
[5] |
LEE S M, HWANG Y J, LEE D H, et al. Efficient Authentication for Low-cost RFID Systems[C]// Springer. International Conference on Computational Science and Its Applications - ICCSA 2005, May 9-12, 2005, Singapore. Berlin: Springer Verlag, 2005: 619-627.
|
[6] |
PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, TAPIADOR J M E, et al. LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID Tags[J]. Proc. of Workshop on RFID Security, 2006(10):6.
|
[7] |
RAPHAEL P. Cryptanalysis of a New Ultralightweight RFID Authentication Protocol—SASI[J]. IEEE Transactions on Dependable & Secure Computing, 2009,6(4):316-320.
|
[8] |
GODOR G, GICZI N, IMRE S. Elliptic Curve Cryptography based Mutual Authentication Protocol for Low Computation Capacity RFID Systems Performance Analysis by Simulations[C]// IEEE. 2010 IEEE International Conference on Wireless Communications, Networking and Information Security, June 25, 2010, Beijing, China. New York: IEEE, 2010: 650-657.
|
[9] |
SUH G E, DEVADAS D. Physical Unclonable Functions for Device Authentication and Secret Key Generation[C]// IEEE. Proceedings of the 44th Annual Design Automation Conference, June 4-8, 2007, San Diego, CA, USA. New York: IEEE, 2007: 9-14.
|
[10] |
YIN Weixin, JIA Yongzhe, GAO Yansong, et al. Research on Physical Unclonable Function[J]. Network Security Technology and Application, 2018(6):41-42, 54.
|
|
尹魏昕, 贾咏哲, 高艳松, 等. 物理不可克隆函数(PUF)研究综述[J]. 网络安全技术与应用, 2018(6):41-42,54.
|
[11] |
PAPPU R. Physical One-way Functions[J]. Science, 2002: 2026-2030.
URL
pmid: 10720331
|
[12] |
WANG Yaodong. The Implementation of Arbiter PUF on FPGA[D]. Wuhan: Huazhong University of Science & Technology, 2018.
|
|
王耀冬. 基于FPGA的仲裁器PUF的实现[D]. 武汉:华中科技大学, 2018.
|
[13] |
LI Song, SUN Ziwen. PUF based Authentication Protocol in Mobile and Large-scale RFID Systems[J]. Computer Engineering & Science, 2018,40(6):1046-1053.
|
|
李松, 孙子文. 基于PUF适用于大规模RFID系统的移动认证协议[J]. 计算机工程与科学, 2018,40(6):1046-1053.
|
[14] |
BURROWS M, ABADI M, NEEDHAM R. A Logic of Authentication[J]. ACM Trans on Computer Systems, 1990,8(1):18-36.
|
[15] |
GOOG Li, NEEDHAM R, YAHALOM R. Reasoning about Belief in Cryptographic Protocols[C]// IEEE. 1990 IEEE Computer Society Symposium on Research in Security and Privacy, May 7-9, 1990, Oakland, CA, USA. New York: IEEE, 1990: 234-248.
|
[16] |
SUN Ziwen, WEI Min. PUF-based Anonymous RFID System Ownership Transfer Protocol[C]// IEEE. 38th Chinese Control Conference, CCC 2019, July 27-30, 2019, Guangzhou, China. New York: IEEE, 2019: 6367-6373.
|
[17] |
MA Chenglin, XIAO Meihua, DENG Chunyan, et al. Security Analysis of the Kerberos* Protocol Based on the Modified GNY Logic[J]. Computer & Digital Engineering, 2014,42(10):1758-1762, 1882.
|
|
马成林, 肖美华, 邓春艳, 等. 基于改进GNY逻辑的Kerberos*协议安全性分析[J]. 计算机与数字工程, 2014,42(10):1758-1762,1882.
|
[18] |
AKGUN M, CAGLAYAN M U. Providing Destructive Privacy and Scalability in RFID Systems Using PUFs[J]. Ad Hoc Networks, 2015,32:32-42.
|