参考文献
[1] Jeremy L. The History of RFID[J]. IEEE Potentials, 2005, 24(4): 8-11.
[2] 胡国胜, 龙 雄. RFID系统安全分析[J]. 网络安全技术与应用, 2013, (2): 40-44.
[3] 李 磊, 陈 静. 物联网感知层中RFID系统安全解决方 案[J]. 网络安全技术与应用, 2011, (6): 34-36.
[4] 李宏年. 基于Hash协议的射频识别系统安全对策[J]. 信息通信技术, 2009, (6): 16-19.
[5] Sun D Z, Zhong J D. A Hash-based RFID Security Protocol for Strong Privacy Protection[J]. IEEE Transactions on Consumer Electronics, 2012, 58(4): 1246-1252.
[6] Liu Leian, Chen Zhiqiang, Yang Ling. Research on the Sec- urity Issues of RFID-based Supply Chain[C]//Proceedings of International Conference on E-Business and E-Government. Guangzhou, China: [s. n.], 2010: 3267-3270.
[7] Rieback M R, Crispo B, Tanenbaum A S. The Evolution of RFID Security[J]. IEEE Pervasive Computing, 2006, 5(1): 62-69.
[8] 陈瑞鑫, 邹传云, 黄景武. 一种基于双向Hash认证的RFID安全协议[J]. 微计算机信息, 2010, (11): 149-151.
[9] Kim Dong-Seong, Shin Taek-Hyun, Park Jong-Sou. A Security Framework in RFID Multi-domain System[C]//Proceedings of the 2nd International Conference on Availability, Reliability and Security. Vienna, Austria: IEEE Press, 2007: 1227-1234.
[10] Pateriya R K. The Evolution of RFID Security and Privacy: A Research Survey[C]//Proceedings of 2011 International Conference on Communication Systems and Network Technologies. [S. l.]: IEEE Press, 2011: 115-119.
[11] Yang Yuanyuan, Lu Zhen. Security Analysis of a Mutual Authentication Protocol for RFID Systems[C]//Proceedings of IMCCC’12. [S. l.]: IEEE Press, 2012: 252-255.
[12] Yan Fang, Liu Bingwu, Huo Lingyu. Research and Design of a Security Framework for RFID System[C]//Proceedings of 2010 International Forum on Information Technology and Applications. [S. l.]: IEEE Press, 2010: 443-445.
[13] Tzipora H, Nitesh S, Shai H. Tree-based HB Protocols for Privacy-preserving Authentication of RFID Tags[J]. Journal of Computer Security, 2011, 19(2): 343-363.
[14] Bashir A K, Chauhdary S H. Mobile RFID and Its Design Security Issues[J]. IEEE Potentials, 2011, 30(4): 34-38.
编辑 陆燕菲
|