参考文献
[1]毛雅佼,孙达志.一种新的RFID标签所有权转移协议[J].计算机工程,2015,41(3):147-150.
[2]赵庚申,低成本柔性电子标签的设计和设备研究[D].大连:大连理工大学,2005.
[3]师鸣若,姜中华.一种无线认证密钥协商协议[J].计算机工程,2009,35(7):142-149.
(下转第183页)
(上接第177页)
[4]隋雷,郭渊博,姜文博,等.基于无线信道特征的密钥生成与提取研究[J].计算机科学,2015,42(2):137-141.
[5]金永明,吴棋滢.基于PRF的RFID轻量级认证协议研究[J].计算机研究与发展,2014,51(7):1506-1514 .
[6]李娅莉.RFID系统的认证与密钥协商协议研究[D].上海:上海交通大学,2010.
[7]Kuo C,Luk M,Negi R,et a1.Message-in-a-bottle:User Friendly and Secure Key Deployment for Sensor Nodes[C]//Proceedings of the 5th International Conference on Embedded Networked Sensor Systems.New York,USA:ACM Press,2007:233-246.
[8]Stajano F,Anderson R.The Resurrecting Duckling:Security Issues for Ubiquitous Computing[J].Computer,2002,35(4):22-26.
[9]Wang Rangding,Jiang Gangyi,Chen Jin’er.A New Method of Audio-digital Watermarking Based on Trap Strategy[J].Journal of Computer Research and Development,2006,43(4):613-620.
[10]刘伟峰,陈怀义.基于面向对象技术的PKI密钥的软件生成[J].计算机工程与科学,2004,26(11):26-32.
[11]Shamir A.Identity-based Cryptosystems and Signature Schemes [C]//Proceedings of LNCS 196:Advances in Crypotogy-Crypto’84.Berlin,Germany:Springer-Verlag,1984:47-53.
[12]黄灿,刘丹,彭春林.RFID系统下基于组合公钥的密钥管理应用研究[J].微电子学与计算机,2013,30(12):104-107.
[13]鲁力.RFID系统密钥无线生成[J].计算机学报,2015,38(4):822-832.
[14]Ranasinghe D C,Cole P H.Confronting Security and Privacy Threats in Modern RFID Systems[C]//Proceedings of the 14th Asilomar Conference on Signals,Systems and Computers.Washington D.C.,USA:IEEE Press,2006:2058-2064.
[15]Heydt-Benjamin T S,Bailey D V,Fu K,et al.Vulnerabilities in First-generation RFID-enabled Credit Cards[C]//Proceedings of FC’07.Berlin,Germany:Springer-Verlag,2007:2-14.
[16]胡德新,王晓明.基于RFID标签的所有权转移认证协议[J].计算机工程与设计,2014,35(3):819-824.
[17]李杰.RFID安全认证协议研究与设计[D].西安:西安电子科技大学,2012.
编辑刘冰顾逸斐
|