1 |
Claude C , Gildas A . Noisy tags: a pretty good key exchange protocol for RFID tags(NTP) In: Proceedings of CARDIS 2006, LNCS 3928, 2006
|
2 |
Chong H K , Gildas A . RFID distance bounding protocol with mixed challenges to prevent relay attacks In: Proceedings of the 8th International Conference on Cryptology and Network Security, 2009
|
3 |
Tsudik G . YA-TRAP: yet another trivial RFID authentication protocol In: Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications Workshops, Washington: 2006
|
4 |
Molnar D , Soppera A , Wagner D . A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags In: Proc Workshop on Selected Areas in Cryptography, 2006
|
5 |
Letri V , Burmester M , Medeirosde B . Universally composable and forward secure RFID authentication and authenticated key exchange Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security, , New York, 2007
|
6 |
Chen Y , Chou J , Sun M . A novel mutual authentication sheme based on quadratic residues for RFID system Computer Networks, 2008,52(12)
|
7 |
丁治国, 郭立, 王星洁 . 基于密钥阵列的RFID安全认证协议 电子与信息学报, 200931(3): 722~726.
|
8 |
王云峰, 焦保盈, 李杰 等. RFID系统可扩展安全认证协议研究 河北工业大学学报 2009,38(5): 1~5
|
9 |
Kim H S , Choi J Y . The design and verification of RFID authentication protocol for ubiquitous computing In:Proceedings of the 18th International Conference on Database and Expert Systems Applications, September2007
|
10 |
冯登国 . 可证明安全性理论与方法研究. 软件学报, 2005,16(10)
|
11 |
Bellare M . Practice-oriented provable-security. In: Modern Cryptology in Theory and Practice,LNCS 1561, Berlin,Heidelberg: Springer-Verlag, 1999
|
12 |
Bellare M , Rogaway p . Entity authentication and key distribution. In: Proc of the Advances in Cryptology-Crypto 93, LNCS 773, , Berlin, Heidelberg: Springer-Verlag1993
|