[1] |
CHENG H C , LIAO W W , CHI T Y ,et al. A secure and practical key management mechanism for NFC read-write mode[C]// 13th International Conference on Advanced Communication Technology (ICACT2011),February 13-16,2011,Seoul,South Korea.[S.l.:s.n]. 2011: 1095-1111.
|
[2] |
丁振华, 李锦涛, 冯波 ,等. 基于 Hash 函数的 RFID 安全认证协议研究[J]. 计算机研究与发展, 2009,46(4): 583-592.
|
|
DING Z H , LI J T , FENG B ,et al. Research on Hash-based RFID security authentication protocol[J]. Journal of Computer Research and Development, 2009,46(4): 583-592.
|
[3] |
曾丽华, 熊璋, 张挺 ,等. Key值更新随机Hash锁对RFID安全隐私的加强[J]. 计算机工程, 2007,33(3): 151-153.
|
|
ZENG L H , XIONG Z , ZHANG T ,et al. Key Value renewal random hash lock for security and privacy enhancement of RFID[J]. Computer Engineering, 2007,33(3): 151-153.
|
[4] |
周世杰, 张文清, 罗嘉庆 ,等. 射频识别(RFID)隐私保护技术综述[J]. 软件学报, 2015,26(4): 960-976.
|
|
ZHOU S J , ZHANG W Q , LUO J Q ,et al. Design and analysis of cryptographic protocols for RFID[J]. Chinese Journal of Computers, 2007,33(3): 151-153.
|
[5] |
钱萍, 吴蒙 . 一种基于 Hash 函数的 RFID 安全认证方法[J]. 电信科学, 2011,27(10): 109-112.
|
|
QIAN P , WU M . A security RFID authentication method based on Hash function[J]. Telecommunications Science, 2011,27(10): 109-112.
|
[6] |
NIU B , ZHU X , CHI H ,et al. Privacy and authentication protocol for mobile RFID systems[J]. Wireless Personal Communications, 2014,77(3): 1713-1731.
|
[7] |
张辉, 侯朝焕, 王东辉 ,等. 一种基于部分 ID 的新型 RFID安全隐私相互认证协议[J]. 电子与信息学报, 2009,31(4): 853-856.
|
|
ZHANG H , HOU Z H , WANG D H ,et al. A new security and privacy on RFID mutual authentication protocol based on partial ID[J]. Journal of Electronics & Information Technology, 2009,31(4): 853-856.
|
[8] |
FELDHOFER M , DOMINIKUS S , WOLKERSTORFER J . Strong authentication for RFID systems using the AES algorithm[C]// Cryptographic Hardware and Embedded Systems(CHES 2004),August 11-13,2004,Cambridge,MA,USA.[S.l.:s.n]. 2004: 357-370.
|
[9] |
BADRA M , BADRA R B . A lightweight security protocol for NFC-based mobile payments[J]. Procedia Computer Science, 2016(83): 705-711.
|
[10] |
EUN H , LEE H , OH H . Conditional privacy preserving security protocol for NFC applications[J]. IEEE Transactions on Consumer Electronics, 2013,59(1): 153-160.
|
[11] |
HE D , KUMAR N , LEE J H . Secure pseudonym-based near field communication protocol for the consumer internet of things[J]. IEEE Transactions on Consumer Electronics, 2015,61(1): 56-62.
|
[12] |
李杰 . RFID 安全认证协议研究与设计[D]. 西安:西安电子科技大学, 2012.
|
|
LI J . Research and design on RFID security authentication protocol[D]. Xi’an:Xidian University, 2012.
|
[13] |
GOLDREICH O , GOLDWASSER S , MICHALI S . How to construct random functions[J]. Journal of the ACM, 1986,33(4): 792-807.
|
[14] |
高树静, 曲英杰, 宋廷强 . 基于单向函数的伪随机数发生器[J]. 计算机研究与发展, 2015,52(6): 1394-1399.
|
|
GAO S J , QU Y J , SONG T Q . Pseudorandom number generators based on one-way functions[J]. Journal of Computer Research and Development, 2015,52(6): 1394-1399.
|
[15] |
LI G , NEEDHAM R , YAHALOM R . Reasoning about belief in cryptographic protocols[C]// IEEE Symposium on Security &Privacy,May 7-9,1990,Oakland,CA,USA. New York:IEEE Computer Society, 1990: 234-248.
|