[1]Pappu R, Recht B, Taylor J, et al. Physical One-way Functions[J]. Science, 2002, 297(5589): 2026-2030.
[2]Rührmair U, Sehnke F, S?lter J, et al. Modeling Attacks on Physical Unclonable Functions[C]//Proc. of the 17th ACM Conference on Computer and Communications Security. Chicago, Illinois, USA: ACM Press, 2010.
[3]Kulseng L, Yu Zhen, Wei Yawen, et al. Lightweight Mutual Authentication and Ownership Transfer for RFID Systems[C]// Proc. of INFOCOM’10. [S. l.]: IEEE Press, 2010.
[4]周永彬, 冯登国. RFID安全协议的设计与分析[J]. 计算机学报, 2006, 29(4): 581-589.
[5]Ranasinghe D, Engels D, Cole P. Security and Privacy: Modest Proposals for Low-cost RFID Systems[C]//Proc. of Intelligent Sensors, Sensor Networks and Information Processing Conference. [S. l.]: IEEE Press, 2004.
[6]Tuyls P, Batina L. RFID-tags for Anti-counterfeiting[C]//Proc. of CT-RSA’06. San Jose, USA: [s. n.], 2006.
[7]Bolotnyy L, Robins G. Physically Unclonable Function-based Security and Privacy in RFID Systems[C]//Proc. of the 5th Annual IEEE International Conference on Pervasive Computing and Communications. [S. l.]: IEEE Press, 2007.
[8]Oztiirk E, Hammouri G, Sunar B. Towards Robust Low Cost Authentication for Pervasive Devices[C]//Proc. of the 6th Annual IEEE International Conference on Pervasive Computing and Communications. [S. l.]: IEEE Press, 2008.
[9]Cortese P F, Gemmiti F, Palazzi B, et al. Efficient and Practical Authentication of PUF-based RFID Tags in Supply Chains[C]// Proc. of IEEE International Conference on RFID Technology and Applications. [S. l.]: IEEE Press, 2010.
[10]Choi W, Kim S, Kim Y, et al. PUF-based Encryption Processor for the RFID Systems[C]//Proc. of the 10th International Conference on Computer and Information Technology. [S. l.]: IEEE Press, 2010.
[11]Kardas S, Akgün M, Kiraz M S, et al. Cryptanalysis of Lightweight Mutual Authentication and Ownership Transfer for RFID Systems[C]//Proc. of Workshop on Lightweight Security & Privacy: Devices, Protocols and Applications. [S. l.]: IEEE Press, 2011. |