参考文献
[1]何文才,阎晓姮,于源猛,等.基于NTRU密码体制的RFID安全协议[J].计算机工程,2014,40(7):114-117,122.
[2]姚华桢,刘传菊,李小敏.基于AES与NTRU的RFID安全认证协议[J].计算机工程与应用,2012,48(35):80-84.
[3]Tuyls P,Batina L.RFID-tags for Anti-counterfeiting[C]//Proceedings of Cryptology-CT-RSA’06.Berlin,Germany:Springer,2006:115-131.
[4]Batina L,Guajardo J,Kerins T,et al.Public-key Cryptography for RFID-tags[C]//Proceedings of PerCom’07.Washington D.C.,USA:IEEE Press,2007:217-222.
[5]Lee Y K,Batina L,Verbauwhede I.EC-RAC:Provably Secure RFID Authentication Protocol[C]//Proceedings of 2008 IEEE International Conference on RFID.Washington D.C.,USA:IEEE Press,2008:97-104.
[6]Zhang X,Li L,Wu Y,et al.An ECDLP-based Randomized Key RFID Authentication Protocol[C]//Proceedings of 2011 International Conference on Network Computing and Information Security.Washington D.C.,USA:IEEE Press,2011:146-149.
[7]Liao Yipin,Hsiao Chih-Ming.A Secure ECC-based RFC Authentication Scheme Integrated with ID-verifier Transfer Protocol[J].Ad Hoc Networks,2014,18(7):133-146.
[8]Piramuthu S.RFID Mutual Authentication Protocols[J].Decision Support Systems,2011,50(2):387-393.
[9]Abyaneh M R S.Security Analysis of Lightweight Schemes for RFID Systems[D].Bergen,Norway:University of Bergen,2012.
[10]Cho J S,James J,Park J H.High Attack Cost:Hash Based RFID Tag Mutual Authentication Protocol[J].Computer Science and Convergence,2012,259(15):113-120.
[11]Piramuthu S.Vulnerabilities of RFID Protocols Proposed in ISF[J].Information Systems Frontiers,2012,14 (3):647-651.
[12]Moriyama D,Matsuo S,Ohkubo M.Relations Among Notions of Privacy for RFID Authentication Protocols[C]//Proceedings of ESORICS’12.Berlin,Germany:Springer,2012:661-678.
[13]Wang S,Liu S.Attacks and Improvements on the RFID Authentication Protocols Based on Matrix[J].Journal of Electronics,2013,30 (1):33-39.
[14]Koblitz A H,Koblitz N,Menezes A.Elliptic Curve Cryptography:The Serpentine Course of a Paradigm Shift[J].Journal of Number Theory,2011,131(5):781-814.
[15]Burrows M,Abadi M,Needham R M.A Logic of Authentication[J].Mathematical and Physical Sciences,1989,426(1871):233-271.
编辑索书志 |