[1] |
CHIEN H Y . SASI: a new ultralightweight RFID authentication protocol providing strong authentication and strong integrity[J]. IEEE Transactions on Dependable and Secure Computing, 2007,4 (4):337-340.
|
[2] |
DUC D C , PARK J , LEE H , et al. Enhancing security of EPC global Gen-2 RFID tag against traceability and cloning[A]. The 2006 Sym-posium on Cryptography and Information Security[C]. 2006.269-277.
|
[3] |
CHEN C L , DENG Y Y . Conformation of EPC class 1 Generation 2 standards RFID system with mutual authentication and privacy protec-tion[J]. Engineering Applications of Artificial Intelligence, 2009,22 (8):1284-1291.
|
[4] |
LI Y Z , CHO Y B , UM N K , et al. Security and privacy on authentica-tion protocol for low-cost RFID[A]. IEEE International Conference on Computational Intelligence and Security[C]. 2006.1101-1104.
|
[5] |
CHOI E Y , LEE D H , LIN J . Anti-cloning protocol suitable to EPC global class-1 Generation-2 RFID systems[J]. Computer Standards &Interfaces, 2009,31 (6):1124-1130.
|
[6] |
SUN H M , TING W C . A Gen2-based RFID authentication protocol for security and privacy[J]. IEEE Transactions on Mobile Computing, 2009,8 (1):1-11.
|
[7] |
陈永林 . 广义逆矩阵的理论与方法[M]. 南京: 南京师范大学出版社, 2005. CHEN Y J . The Theory and Method of Generalized Inverse Ma-trix[M]. Nanjing: Nanjing Normal University Press, 2005.
|
[8] |
GONG L , NEEDHAM R , YAHALOM R . Reasoning about belief in cryptographic protocols[A]. IEEE Computer Society Symposium in Security and Privacy[C]. 1990.234-248.
|
[9] |
SUN H M , TING W C , CHANG S Y . Offlined simultaneous grouping proof for RFID tags[A]. Proceedings of the 2nd International Confer-ence on Computer Science and Its Applications[C]. Jeju, Korea, 2009.404-409.
|
[10] |
肖锋, 周亚建, 周景贤 等. 标准模型下可证明安全的RFID双向认证协议[J]. 通信学报, 2013,34(4):82-87. XIAO F , ZHOU Y J , ZHOU J X , et al. Provable secure mutual authen-tication protocol for RFID in the standard model[J]. Journal on Com-munications, 2013,34(4):82-87.
|
[11] |
KARTHIKEYAN S , NESTERENKO M . RFID security without ex-tensive cryptography[A]. Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks[C]. 2005.63-67.
|