[1]Batina L, Sakiyama K, Verbauwhede I M R. Compact Public Key Implementations for RFID and Sensor Nodes[J]. Secure Integrated Circuits and Systems, 2010, (4): 179-195. [2]Juels A. “Yoking-proofs” for RFID Tags[C]//Proc. of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops. Washington D. C., USA: IEEE Computer Press, 2004: 138-143. [3]Saito J, Sakurai K. Grouping Proof for RFID Tags[C]//Proc. of International Conference on Advanced Information Networking and Applications. Taipei, China: IEEE Computer Press, 2005. [4]Lee Y K, Batina L, Verbauwhede I. Provably Secure RFID Authentication Protocol[C]//Proc. of International Conference on RFID. Los Alamitos, USA: IEEE Computer Press, 2008: 97-104. [5]Batina L, Lee Y K, Seys S, et al. Privacy Preserving ECC-based Grouping Proofs for RFID[C]//Proc. of the 13th International Conference on Information Security. Berlin, Germany: Springer- Verlag, 2010. [6]Lv Chao, Li Hui, Ma Jianfeng, et al. Security Analysis of a Privacy-preserving ECC-based Grouping-proof Protocol[J]. Journal of Convergence Information Technology, 2011, 6(3): 113-119. [7]Ko W T, Chiou S V, Lu E H, et al. An Improvement of Privacy- preserving ECC-based Grouping Proof for RFID[C]//Proc. of Cross Strait Quad-regional Radio Science and Wireless Technology Conference. Harbin, China: [s. n.]: 2011: 1062-1064. [8]Batina L, Lee Y K, Seys S, et al. Extending ECC-based RFID Authentication Protocols to Privacy-preserving Multi-party Grouping Proofs[J]. Journal of Personal and Ubiquitous Computing, 2012, 16(3): 323-335. [9]Lin Qiping, Zhang Fangguo. ECC-based Grouping-Proof RFID for Inpatient Medication Safety[J]. Journal of Medical Systems, 2011, 35(3): 369-375. [10]Boneh D, Lynn B, Cham H S. Short Signatures from the Weil Pairing[J]. Journal of Cryptology, 2004, 17(4): 297-319.
|