参考文献
[1]李志清.物联网安全问题研究[J].网络安全技术与应用,2011,(10):5759.
[2]SArma S E,Weis S A,Engels D W.RFID Systems and Security and Privacy Implications[C]//Proceedings of the 4th Internationa1 Workshop on Cryptographic Hardware and Embedded Systems.Berlin,Germany:Springer,2003:454469.
[3]Sarma S E,Weis S A,Engels D W.Radio Frequency Identification:Secure Risks and Challenges[J].RSA Laboratories Cryptobytes,2003,6(1):29.
[4]Weis S A,Sarma S E,Rivest R L,et al.Security and Privacy Aspects of Low Cost Radio Frequency Identification Systems[C]//Proceedings of the lst Internationa1 Conference on Security in Pervasive Computing.Berlin,Germany:Springer,2004,20l212.
[5]王晓华.RFID系统的安全问题及其解决方案[J].物流技术,2008,27(1):110116.
[6]Ohkubo M,Suzuki K,Kinoshita S.Hashchain Based Forwardsecure Privacy Protection Scheme for Lowcost RFID[C]//Proceedings of Symposium on Cryptography and Information Security.Berlin,Germany:Springer,2004:719724.
[7]Henrici D,Muller P.Hashbased Enhancement of Location Privacy for Radiofrequency Identification Devices Using Varying Identifiers[C]//Proceedings of the 2nd IEEE Annua1 Conference on Pervasive Computing and Communications.Washington D.C.,USA:IEEE Press,2004:149153.
[8]Lee S M,Hwang Y J,Lee D H,et al.Efficient Authentication for Low Cost RFID Systems[C]//Proceedings of International Conference on Computational Science and Its Applications.Berlin,Germany:Springer,2005:6l9627.
[9]Molnar D,Wagner D.Privacy and Security in Library RFID:Issues,Practices,and Architectures[C]//Proceedings of the 11th ACM Conference on Computer and Communications Security.New York,USA:ACM Press,2004:2102l9.
[10]余恬恬.RFID安全认证协议的研究与设计[D].成都:西南交通大学,2010.
[11]Wang Bangju,Zhang Huanguo,Wang Zhangyi,et a1.A Secure Mutual Password Authentication Scheme with User Anonymity[J].Geometrics and Information Science of Wuhan University,2008,33(10):10731075.
[12]陈娴.RFID安全协议及加密算法研究[D].成都:电子科技大学,2010.
[13]马巧梅,王尚平.一个超轻量级的RFID认证协议[J].计算机工程,2012,38(2):151152,158.
[14]梁晨.基于物联网的RFID安全认证协议研究与设计[D].西安:西安电子科技大学,2011.
[15]Yue Leixiao,Yu Minwang,Liao Junpang.Verification of Trusted Network Access Protocols in the Strand Space Model[J].IEICE Transactions on Fundamentals of Electronics,Communications & Computer Sciences,2012,95(3):665668.
编辑顾逸斐
|