[1] |
HA J , MOON S , et al. Lightweight and resynchronous mutual authentication protocol for RFID system[A]. LNCS[C]. 2007,4412: 80-89.
|
[2] |
TAN C C , SHENG B , LI Q . Secure and serverless RFID aut tication and search protocols[J]. IEEE Transactions on Wireless Communications, 2008,7(4): 1400-1407.
|
[3] |
CHEN C L , DENG Y Y . Conformation of EPC class 1 and ge ion 2 standards RFID system with mutual authentication and privacy protection[J]. Engineering Applications of Artificial Intelligence, 2009,22(8): 1284-1291.
|
[4] |
CAI S , LI Y , LI T , et al. Attacks and improvements to an RFID mutual authentication protocol[A]. WiSec'09[C]. 2009. 51-58.
|
[5] |
PIRAMUTHU S . RFID mutual authentication protocols[J]. Decision Support Systems, 2011,50(2): 387-393.
|
[6] |
PERIS-LOPEZ P , HERNANDEZ-CASTRO J C , TAPIADOR J E , et al. Cryptanalysis of an EPC class-1generation-2 standard compliantl authentication protocol[J]. Engineering Applications o tificial Intelligence, 2011,24(6): 1061-1069.
|
[7] |
邓淼磊, 王玉磊, 邱罡 等. 无需后端数据库的 RFID 认证协议[J]. 北京邮电大学学报, 2009,32(4):59-62. DENG M L , WANG Y L , QIU G , et al. Authentication protocol for RFID without back-end database[J]. Journal of Beijing University of Posts and Telecommunications, 2009,32(4):59-62.
|
[8] |
马昌社 . 前向隐私安全的低成本 RFID 认证协议[J]. 计算机学报, 2011,34(8):1387-1398. MA C S . Low cost RFID authentication protocol with forward privacy[J]. Chinese Journal of Computer, 2011,34(8):1387-1398.
|
[9] |
GODOR G , GICZI N , SANDOR I . Elliptic curve cryptography based mutual authentication protocol for low computational complexity environment[A]. ISWPC'2010[C]. 2010. 331-336.
|
[10] |
蔡庆玲, 詹宜巨, 余松森 等. 基于NTRU公钥密码系统的RFID通信安全协议的研究[J]. 中山大学学报(自然科学版), 2009,48(5):6-11. CAI Q L , ZHAN Y J , YU S S , et al. RFID communication security protocol based on NTRU public key cryptosystem[J]. Acta Scientiarum Naturalium Universitatis Sunyatseni, 2009,48(5):6-11.
|
[11] |
HOPPER N J , BLUM M . Security human identification protocol[A]. ASIACRYPT’01[C]. 2001. 52-66.
|
[12] |
GOLDREICH O , GOLDWASSER S , MICALI S . How to construct random functions[J]. Journal of the Association for Computing Machinery, 1986,33(4): 792-807.
|
[10] |
邓淼磊, 马剑峰, 周利华 . RFID匿名认证协议的设计[J]. 通信学报, 2009,30(7):20-26. DENG M L , MA J F , ZHOU L H . Design of anonymous authentication protocol for RFID[J]. Journal on Communications, 2009,30(7):20-26.
|