[1] Sarma S E, Weis S A, Engels D W. RFID Systems and Security and Privacy Implications[C]//Proceedings of CHE’02. San Francisco, USA: IEEE Press, 2002: 454-469.
[2] Sarma S E, Weis S A, Engels D W. Radio-frequency Identi- fication: Secure Risks and Challenges[J]. RSA Laboratories- CryptoBytes, 2003, 6(1): 2-9.
[3] 林责彬, 王永华, 詹宜巨. 一种基于随机序列的RFID安全协议[J]. 计算机工程, 2008, 34(20): 151-153.
[4] Molnar D, Wagner D. Privacy and Security in Library RFID Issues, Practices, and Architectures[C]//Proceedings of the 11th ACM Conference on Computer and Communications Security. Wyndham, USA: ACM Press, 2004: 210-219.
[5] Lopez P P, Hern J C, Tapiador J M E, et al. LMAP: A Real Lightweight Mutual Authentication Protocol for Low-cost RFID Tags[C]//Proceedings of the 2nd Workshop on RFID Security. Graz, Austria: Springer, 2006: 1-12.
[6] Arco P D, Santis A D. On Ultralightweight RFID Authenti- cation Protocols[J]. IEEE Transactions on Dependable and Secure Computing, 2011, 8(4): 548-563.
[7] Song B, Mitchell C J. RFID Authentication Protocol for Low-cost Tags[C]//Proceedings of the 1st ACM Conference on Wireless Network Security. Virginia, USA: ACM Press, 2008: 140-147.
[8] Mubarak M F, Manan J A, Yahya S. Mutual Attestation Using TPM for Trusted RFID Protocol[C]//Proceedings of the 2nd International Conference on Network Applications, Protocols and Services. Kuala Lumpur, USA: IEEE Press, 2010: 153- 158.
[9] Khan G N, Moessner M B. Secure Authentication Protocol for RFID Systems[C]//Proceedings of the 20th International Conference on Computer Communications and Networks. Toronto, USA: IEEE Press, 2011: 1-7.
[10] Sun H M, Ting W C. A Gen2-based RFID Authentication Protocol for Security and Privacy[J]. IEEE Transactions on Mobile Computing, 2009, 8(8): 1052-1062.
[11] Wang Chonggang, Daneshmand M, Sohraby K, et al. Perfor- mance Analysis of RFID Generation-2 Protocol[J]. IEEE Tran- sactions on Wireless Communications, 2009, 8(5): 2592-2601.
[12] Cai Shaoying, Li Yingjiu, Li Tieyan, et al. Attacks and Im- provements to an RFID Mutual Authentication Protocol and Its Extensions[C]//Proceedings of the 2nd ACM Conference on Wireless Network Security. Zurich, USA: ACM Press, 2009: 51-58.
[13] Shamir A. SQUASH——A New MAC with Provable Security Properties for Highly Constrained Devices Such as RFID Tags[C]//Proceedings of FSE’08. Lausanne, Switzerland: [s. n.], 2008: 144-157.
[14] Shen S S, Liao H R, Lin S H, et al. A Novel Stream Cipher with Hash Function for the RFID Device[C]//Proceedings of the 15th International Conference on Innovative Mobile and Internet Services in Ubiquitous Computing. Seoul, Korea: IEEE Press, 2011: 532-536.
[15] Aumasson J P, Henzen L, Meier W, et al. Quark: A Light- weight Hash[C]//Proceedings of CHES’10. Santa Barbara, USA: [s. n.], 2010: 1-15.
编辑 金胡考 |