[1] |
HEIN D , WOLKERSTORFER J , FELBER N . ECC is ready for RFID-a proof in silicon[C]// Selected Areas in Cryptography.Springer Berlin Heidelberg. 2008: 401-413.
|
[2] |
TUYLS P , BATINA L . RFID-tags for anti-counterfeiting[C]// Crypto Topics in Cryptology. 2006: 115-131.
|
[3] |
BATINA L , GUAJARDO J , KERINS T ,et al. Public-key cryptography for RFID-tags[C]// International Workshop on Pervasive Computing & Communication Security-PERSEC. 2007: 217-222.
|
[4] |
YONG K L , BATINA L , VERBAUWHEDE I . EC-RAC(ECDLP based randomized access control):provably secure RFID authentication protocol[C]// IEEE International Conference on RFID. 2008: 97-104.
|
[5] |
YONG K L , BATINA L , VERBAUWHEDE I . Untraceable RFID authentication protocols:revision of EC-RAC[C]// IEEE International Conference on RFID. 2009: 178-185.
|
[6] |
YONG K L , BATINA L , SINGELéE D ,et al. Wide-weak privacypreserving RFID authentication protocols[M]. Mobile Lightweight Wireless Systems,Springer Berlin Heidelberg, 2010: 254-267.
|
[7] |
CHOU J S , CHEN Y , WU C L ,et al. An efficient RFID mutual authentication scheme based on ECC[J]. iacr Cryptology EPrint Archive, 2011.
|
[8] |
LIAO Y P , HSIAO C M . A secure ECC-based RFID authentication scheme using hybrid protocols[M]. Advances in Intelligent Systems and Applications-Volume 2, 2013: 1-13.
|
[9] |
ZHAO Z . A Secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem[J]. Journal of Medical Systems, 2014,38(5): 1-7.
|
[10] |
杨玉龙, 彭长根, 周洲 ,等. 基于Edwards曲线的移动RFID安全认证协议[J]. 通信学报, 2014,35(11): 132-138.
|
|
YANG Y L , PENG C G , ZHOU Z ,et al. Edwards curves based security authentication protocol for mobile RFID systems[J]. Journal on Communications, 2014,35(11): 132-138.
|
[11] |
TAN C C , SHENG B , LI Q . Secure and serverless RFID authentication and search protocols[J]. IEEE Transactions on Wireless Communications, 2008,7(4): 1400-1407.
|
[12] |
BURMESTER M , MEDEIROS B D , MOTTA R . Robust,anonymous RFID authentication with constant key-lookup[C]// ACM Symposium on Information,Computer and Communications Security. 2008: 283-291.
|
[13] |
YANG L , YU P , BAILING W ,et al. IOT secure transmission based on integration of IBE and PKI/CA[J]. International Journal of Control &Automation, 2013,6(2): 245-253.
|
[14] |
张兵, 秦志光, 万国根 . 基于PKI和CPK的RFID系统混合密钥管理机制研究[J]. 电子科技大学学报, 2015,44(3): 415-421.
|
|
ZHANG B , QIN Z G , WAN G G . Study on hybrid key management mechanisms of RFID system based on PKI and CPK[J]. Journal of University of Electronic Science and Technology of China, 2015,44(3): 415-421.
|
[15] |
南相浩 . CPK 公钥体制与标识鉴别[M]. 北京: 电子工业出版社, 2012.
|
|
NAN X H . CPK Cryptosystem and identity authentication[M]. Beijing: Publishing House of Electronics IndustryPress, 2012.
|
[16] |
高伟, 张国印, 王欣萍 ,等. 一种改进的椭圆曲线数字签名算法[J]. 黑龙江大学自然科学学报, 2010,27(3): 775-780.
|
|
GAO W , ZHANG G Y , WANG X P ,et al. An improved elliptic curve digital signature algorithm[J]. Journal of Natural Science of Heilongjiang University, 2010,27(3): 775-780.
|
[17] |
HANKERSON D , MENEZES A , VANSTONE S . Guide to elliptic curve cryptography[M]. Guide to elliptic curve cryptography,Springer Berlin Heidelberg, 2004.
|