参考文献
[1] 宁焕生, 徐群玉. 全球物联网发展及中国物联网建设若干思考[J]. 电子学报, 2010, 38(11): 2591-2599.
[2] 吴振强, 周彦伟, 马建峰. 物联网安全传输模型[J]. 计算机学报, 2011, 34(8): 1351-1363.
[3] 张 忠, 徐秋亮. 物联网环境下UC安全的组证明RFID协议[J]. 计算机学报, 2011, 34(7): 1188-1194.
[4] Song Zhengfeng, Zhang Yali, Wu Changming. A Reliable Transmission Scheme for Security and Protection System Based on Internet of Things[C]//Proc. of ICCTA’11. Beijing, China: [s. n.], 2011: 806-810.
[5] Forsstrom S, Kanter T, Osterberg P. Ubiquitous Secure Interac- tions with Intelligent Artifacts on the Internet of Things[C]//Proc. of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. Liverpool, UK: [s. n.], 2012: 1520-1524.
[6] 孙玉砚, 刘卓华, 李 强, 等. 一种面向3G接入的物联网安全架构[J]. 计算机研究与发展, 2010, 47(增刊): 327- 332.
[7] Ma Changshe, Li Yingjiu, Deng R, et al. RFID Privacy: Relation Between Two Notions, Minimal Condition, and Efficient Construction[C]//Proc. of the 16th ACM Conference on Computer and Communications Security. Chicago, USA: [s. n.], 2009: 54-65.
[8] Berbain C, Billet O, Etrog J, et al. An Efficient Forward Private RFID Protocol[C]//Proc. of the 16th ACM Conference on Computer and Communications Security. Chicago, USA: [s. n.], 2009: 43-53.
[9] Ohkubo M, Suzuki K, Kinoshita S. Cryptographic Approach to Privacy-friendly[C]//Proc. of RFID Privacy Workshop. Cambridge, USA: [s. n.], 2003: 624-654.
[10] Feldhofer M, Wolkerstorfer J. Strong Crypto RFID Tags—— A Comparison of Low-power Hardware Implementations[C]// Proc. of IEEE International Symposium on Circuits and Systems. New Orleans, USA: [s. n.], 2007: 27-30.
编辑 索书志 |