[1] |
张平, 李建武, 冯志勇 ,等. 认知无线网络基础理论与关键技术研究[J]. 电信科学, 2014,30(2): 1-13.
|
|
ZHANG P , LI J W , FENG Z Y ,et al. Research on basic theory and key technology of cognitive radio network[J]. Telecommunications Science, 2014,30(2): 1-13.
|
[2] |
李荣荣, 寇建涛, 董刚 ,等. 面向智慧园区的RFID系统信息安全认证方案[J]. 电信科学, 2016,32(2): 164-169.
|
|
LI R R , KOU J T DONG G ,et al. A security authentication scheme in RFID system for smart park[J]. Telecommunications Science, 2016,32(2): 164-169.
|
[3] |
轩秀巍, 膝建辅, 自煜 . 基于二次剩余的增强型RFID认证协议[J]. 计算机工程, 2012,38(3): 123-125.
|
|
XUAN X W , XI J F , ZI Y . Enhanced RFID authentication protocol based on quadratic residue[J]. Computer Engineering, 2012,38(3): 123-125.
|
[4] |
DOSS R , ZHOU W L , YU S . Secure RFID tag ownership transfer based on quadratic residues[J]. IEEE Transactions on Information Forensics and Security, 2013,8(2): 390-401.
|
[5] |
高利军 . 无线射频识别系统安全认证协议研究[D]. 天津:天津大学, 2015: 70-71.
|
|
GAO L J . Research on security authentication protocol for radio frequency identification system[D]. Tianjin:Tianjin University, 2015: 70-71.
|
[6] |
VAIDYA B , MAKRAKIS D , MOUFTAH H T . Authentication mechanism for mobile RFID based smart grid network[C]// Electrical and Computer Engineering(CCECE),May 4-7,2014,Toronto,ON,Canada. Piscataway:IEEE Press, 2014: 1-6.
|
[7] |
裴小强, 卫宏儒 . 基于Hash链的RFID安全双向认证协议[J]. 计算机应用, 2014,34(S1): 47-49.
|
|
PEI X Q , WEI H R . RFID mutual security authentication protocol based on Hash-chain[J]. Journal of Computer Applications, 2014,34(S1): 47-49.
|
[8] |
NIU B , ZHU X , CHI H ,et al. Privacy and authentication protocol for mobile RFID systems[J]. Wireless Personal Communications, 2014,77(3): 1713-1731.
|
[9] |
寇红召, 张紫楠, 马骏 . 基于物理不可隆函数的RFID双向认证[J]. 计算机工程, 2013,39(6): 142-145.
|
|
KOU H Z , ZHANG Z N , MA J . RFID bi-directional authentication based on physical immovable function[J]. Computer Engineering, 2013,39(6): 142-145.
|
[10] |
王超 . 超轻量级 RFID 认证协议研究与实现[D]. 南京:南京航空航天大学, 2014.
|
|
WANG C . Research and implementation of super lightweight RFID authentication protocol[D]. Nanjing:Nanjing University of Aeronautics & Astronautics, 2014.
|
[11] |
CHEN Y L , CHOU J S , SUN H M . A novel mutual authentication scheme based on quadratic residues for RFD systems[J]. Computer Networks, 2008,52(12): 2373-2380.
|
[12] |
YEH T C , WU C H , TSENG Y M . Improvement of the RFID authentication scheme based on quadratic residues[J]. Computer Communications, 2011,34(3): 337-341.
|
[13] |
IMPLIED E OR , THIS T , IS D ,et al. Specification for RFID air interface EPC “radio-frequency identity protocols class-1 generation-2 UHF RFID protocol for communications at 860MHz-960MHz[EB]. 2013.
|
[14] |
ZHOU J . A quadratic residue-based lightweight RFID mutual authentication protocol with constant-time identification[J]. Journal of Communications, 2015,10(2): 117-123.
|
[15] |
周治平, 张惠根 . 一种更具实用性的移动 RFID 认证协议[J]. 传感技术学报, 2016,29(2): 271-277.
|
|
ZHOU Z P , ZHANG H G . A more practical mobile RFID authentication protocol[J]. Chinese Journal of Sensors and Actuators, 2016,29(2): 271-277.
|
[16] |
马巧梅 . 基于 HMAC 的轻量级 RFID 认证协议[J]. 微处理机, 2015,5(4): 27-31.
|
|
MA Q M . A HMAC-based RFID lightweight authentication protocol[J]. Microprocessors, 2015,5(4): 27-31.
|
[17] |
杜宗印, 章国安, 袁红林 . 基于位替换运算的RFID双向认证协议[J]. 电视技术, 2013,37(19): 134-137.
|
|
DU Z Y , ZHANG G A , YUAN H L . Bits substitution based on RFID mutual authentication protocol[J]. Video Engineering, 2013,37(19): 134-137.
|
[18] |
侯峻峰, 黄连生 . 安全协议形式化验证方法和安全协议设计研究[D]. 北京:清华大学, 2004.
|
|
HOU J F , HUANG L S . Research on formal verification method and security protocol design for security protocol[D]. Beijing:Tsinghua University, 2004.
|
[19] |
王崇霞, 高美真, 刘倩 ,等. 混合云联合身份认证与密钥协商协议设计[J]. 电信科学, 2014,30(4): 95-99,108.
|
|
WANG C X , GAO M Z , LIU Q ,et al. Design of united identity authentication and key agreement protocol for hybrid cloud[J]. Telecommunications Science, 2014,30(4): 95-99,108.
|