[1] Ari J. RFID Security and Privacy: A Research Survey[J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 381-394. [2] 周永彬, 冯登国. RFID安全协议的设计与分析[J]. 计算机学报, 2006, 29(4): 581-589. [3] Weis S A, Sarma S E, Rivest R L, et al. Security and Privacy Aspects of Low-cost Radio Frequency Identification Systems[C]// Proc. of the 1st Security in Pervasive Computing. Berlin, Germany: Springer-Verlag, 2003. [4] Ohkubo M, Suzuki K, Kinoshita S. Hash-chain Based Forward- secure Privacy Protection Scheme for Low-cost RFID[C]//Proc. of Symposium on Cryptography and Information Security. Sendai, China: [s. n.], 2004. [5] Molnar D, Wagner D. Privacy and Security in Library RFID: Issues, Practices, and Architectures[C]//Proc. of the 11th ACM Conference on Computer and Communications Security. Washington D. C., USA: [s. n.], 2004. [6] Lee S M, Hwang Y J, Lee D H, et al. Efficient Authentication for Low-cost RFID Systems[C]//Proc. of International Conference on Computational Science and Its Applications. Berlin, Germany: Springer-Verlag, 2005. [7] Wang Hua, Sun Lili, Yong Jianming, et al. Privacy Preserving on Radio Frequency Identification Systems[C]//Proc. of the 13th International Conference on Computer Supported Cooperative Work in Design. Santiago, Chile: [s. n.], 2009. [8] Bao Guihao, Zhang Minggao, Liu Jiuwen, et al. The Design of an RFID Security Protocol Based on RSA Signature for E-ticket[C]//Proc. of the 2nd IEEE International Conference on Information Management and Engineering. Chengdu, China: [s. n.], 2010. [9] Chen Chih-Yung, Kuo Chien-Ping, Chien Fang-Yuan. An Ex- ploration of RFID Information Security and Privacy[C]//Proc. of Joint Conferences on Pervasive Computing. [S. l.]: IEEE Press, 2009. [10] Li Yongzhen, Jeong Y S. Low-cost Authentication Protocol of the RFID System Using Partial ID[C]//Proc. of Conference on Com- putational Intelligence and Security. Guangzhou, China: [s. n.], 2006. [11] 刘志亮, 薛小平, 王小平. 基于离散ID序列的RFID标签认证协议[J]. 计算机工程, 2009, 35(2): 159-161. [12] 王益维, 赵跃华, 李晓聪. 基于EPC-C1G2标准的RFID认证机制[J]. 计算机工程, 2010, 36(18): 153-154, 157.
|