[1] 周永彬, 冯登国. RFID安全协议的设计与分析[J]. 计算机学报, 2006, 29(4): 583-589. [2] 邓淼磊. 几类安全协议的研究与设计[D]. 西安: 西安电子科技大学, 2010. [3] 张俊钦, 谷大武, 侯方勇. 改进的仲裁器PUF设计与分 析[J]. 计算机工程, 2010, 36(3): 249-250, 253. [4] Suh G E, Devadas S. Physical Unclonable Functions for Device Authentication and Secret Key Generation[C]//Proc. of the 44th ACM/IEEE Design Automation Conference. New York, USA: ACM Press, 2007. [5] Gassend B, Clarke D, Dijk M, et al. Silicon Physical Random Functions[C]//Proc. of the 9th ACM Conference on Computer and Communications Security. New York, USA: [s. n.], 2002. [6] Hammouri G, Ozturk E, SunarA B. A Tamper-proof and Lightweight Authentication Scheme[J]. Pervasive and Mobile Computing, 2008, 4(6): 807-818. [7] 杨 灵, 闰大顺. 基于PUF的低成本RFID系统安全协议[J]. 计算机工程, 2010, 36(15): 148-149, 155. [8] 张 辉, 侯朝焕, 王东辉. 一种基于部分ID的新型RFID安全隐私相互认证协议[J]. 电子与信息学报, 2009, 31(4): 853-856. [9] 丁振华, 李锦涛, 冯 波. 基于Hash函数的RFID安全认证协议研究[J]. 计算机研究与发展, 2009, 46(4): 583-592. [10] Kulseng L, Zhen Yu. Lightweight Mutual Authentication and Ownership Transfer for RFID Systems[C]//Proc. of INFOCOM’10. [S. l.]: IEEE Press, 2010. [11] Holcomb D E, Burleson W P, Kevin F U. Initial SRAM State as a Fingerprint and Source of True Random Numbers for RFID Tags[C]//Proc. of Conference on RFID Security. [S. l.]: RFID Publications, 2007. [12] Maes R, Tuyls P, Verbauwhede T. Intrinsic PUFs from Flip- flops on Reconfigurable Devices[C]//Proc. of the 3rd Benelux Workshop on Information and System Security. Eindhoven, Holland: [s. n.], 2008. 编辑 刘 冰 |