参考文献
[1]刘博雅,郭国辉,李子臣.基于端到端协议的RFID双向认证协议[J].北京电子科技学院学报,2014,22(4):29-33.
[2]Sarma S E,Weis S A,Engels D W.RF1D Systems and Security Implications[M]//Ko C K,Paar C.Crypto-graphic Hardware and Embedded Systems.Berlin,Germany:Springer,2003:454-469.
[3]Weis S A,Sarma S E,Rivest R L,et al.Security and Privacy Aspects of Low-cost Radio Frequency Identi-fication Systems[M]//Ferrari G.Security in Pervasive Computing.Berlin,Germany:Springer,2004:201-212.
[4]Henrici D,Muller P.Hash-based Enhancement of Location Privacy for Radio-frequency Identification Devices Using Varying Identifiers[C]// Proceedings of the 2nd IEEE Annual Conference on Pervasive Com-puting and
Communications.Washington D.C.,USA:IEEE Press,2004:149-153.
[5]Rhee K,Kwak J,Kim S,et al.Challenge-response Based RFID Authentication Protocol Distributed Database Environment[C]//Proceedings of International Con-ference on Security in Pervasive Computing.Berlin,Germany:Springer,2005:70-84.
(下转第104页)
(上接第100页)
[6]熊宛星,薛开平,洪佩琳,等.基于二维区间Hash链的RFID安全协议[J].中国科学技术大学学报,2011,41(7):594-598.
[7]Tuyls P,Batina L.RFID-tags for Anti-counterfeit-ing[M].Berlin,Germany:Springer,2006.
[8]Lee Y K,Batina L,Verbauwhde I.EGRAC(ECDLP based Randomized Access Control):Provably Secure RFID Authentication Protocol[C]//Proceedings of IEEE Inter-national Conference on RFID.Washington D.C.,USA:IEEE Press,2008:97-104.
[9]Chen Yalin,Chou Jue-sam,Lin Chi-fong,et al.A Novel RFID Authentication Protocol Based on Elliptic Curve Crypto System[EB/OL].(2011-01-13).http://eprint.iacr.org/2011/381.pdf.
[10]王笑梅,张秋剑.基于椭圆曲线零知识的RFID双向身份认证[J].计算机工程与应用,2013,49(15):97-100.
[11]Piramuthu S.RFID Mutual Authentication Protocols[J].Decision Support Systems,2011,50(2):387-393.
[12]Abyaneh M R S.Security Analysis of Lightweight Schemes for RFID Systems[D].Bergen,Norway:University of Bergen,2012.
[13]Cho J S,James J,Park J H.High Attack Cost:Hash Based RFID Tag Mutual Authentication Protocol[M]//Chao H C,Obaidat M,Kim J.Computer Science and Convergence.Berlin,Germany:Springer,2012.
[14]Piramuthu S.Vulnerabilities of RFID Protocols Proposed in ISF[J].Information Systems Frontiers,2012,14(3):647-651.
[15]Moriyama D,Matsuo S,Ohkubo M.Relations Among Notions of Privacy for RFID Authentication Protocols[J].IEICE Transactions on Fundamentals of Electronics Com-munications & Computer Sciences,2014,97(1):225-235.
[16]Wang Shaohui,Liu Sujuan.Attacks and Improvements on the RFID Authentication Protocols Based on Matrix[J].Journal of Electronics,2013,30(1):33-39.
编辑顾逸斐 |