参考文献
[1] Nambiar A N. RFID Technology: A Review of Its Appli- cations[C]//Proc. of World Congress on Engineering and Computer Science. San Francisco, USA: [s. n.], 2009: 1-7.
[2] Sarma S E, Weis S A, Engels D W. Radio-frequency Iden- tification: Secure Risks and Challenges[J]. RSA Laboratories Cryptobytes, 2003, 6(1): 2-9.
[3] Weis S A, Sarma S E, Rivest R L, et al. Security and Privacy Aspects of Low-cost Radio Frequency Identification Sys- tems[C]//Proc. of the 1st International Conference on Security in Pervasive Computing. Boppard, Germany: IEEE Press, 2004: 201-212.
[4] 周永彬, 冯登国. RFID安全协议的设计和分析[J]. 计算机学报, 2006, 29(4): 581-589.
[5] Lee S M, Hwang Y J, Lee D H. Efficient Authentication for Low-cost RFID Systems[C]//Proc. of ICCSA’05. Berlin, Germany:
Springer-Verlag, 2005: 619-627.
[6] Molnar D, Soppera A, Wagner D. A Scalable, Delegatable Ps- eudonym Protocol Enabling Ownership Transfer of RFID Tags[C]//Proc. of Workshop on Selected Areas in Crypto- graphy. Berlin, Germany: Springer-Verlag, 2006: 276-290.
[7] Le T V, Burmester M, Medeirosde B. Universally Composable and Forward Secure RFID Authentication and Authenticated Key Exchange[C]//Proc. of the 2nd ACM Symposium on In- formation, Computer and Communications Security. New York, USA: 2007: 242-252.
[8] Tsudik G. YA-TRAP: Yet Another Trivial RFID Authentication Protocol[C]//Proc. of the 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops. Pisa, Itlay: IEEE Press, 2006: 640-651.
[9] Stephen A. Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems[C]//Proc. of the 1st Conference on Security in Pervasive Computing. Boppard, Germany: Spring-Verlag, 2004: 201-212
[10] Peris-Lopez P, Estevez-Tapiador J M, Hernandez-Castro J, et al. EMAP: An Efficient Mutual-authentication Protocol for Low-Cost RFID Tags[C]//Proc. of OTM Workshops. Berlin, Germany: Springer-Verlag, 2006: 352-361.
[11] Li Tieyan, Wang Guilin. Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols[C]//Proc. of IFIP SEC 2007. Sandton, South Africa: [s. n.], 2007: 109-120.
[12] Dimitriou T. A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks[C]//Proc. of Conference on Security and Privacy for Emerging Areas in Communication Networks. [S. l.]: IEEE Press, 2005: 59-66.
[13] Li Tieyan, Wang Guilin, Deng R H. Security Analysis on a Family of Ultra-lightweight RFID Authentication Protocols[J]. Journal of Software, 2008, 3(3): 1-10.
[14] 姚华桢, 刘传菊. 基于AES与NTRU的RFID安全认证协议[J]. 计算机应用与工程, 2012, 48(35): 80-84.
[15] 李 斌, 凌 力. 一种基于NTRU公钥加密系统的RFID认证协议[J]. 计算机应用与软件, 2012, 29(4): 278-280.
[16] 冯 军, 潘 郁. 基于共享密钥的RFID认证协议[J]. 自动化仪表, 2012, 33(6): 49-52
[17] Kaya S V, Sava E. Public Key Cryptography Based Privacy Preserving Multi-context RFID Infrastructure[J]. Ad Hoc Networks, 2009, 7(1): 136-152.
[18] 陈 剑, 张 春. 低功耗RFID的公钥密码系统实现[J]. 半导体技术, 2009, (9): 890-894.
编辑 金胡考 |