[15] |
贝毅君, 干红华, 程学林 ,等. RFID技术在物联网中的应用[M]. 北京: 人民邮电出版社, 2013.
|
|
BEI Y J , GAN H H , CHENG X L ,et al. RFID technology applications in internet of things[M]. Beijing: Posts & Telecom PressPress, 2013.
|
[1] |
黄玉兰 . 物联网射频识别(RFID)核心技术详解:第2版[M]. 北京: 人民邮电出版社, 2012: 1-14.
|
|
HUANG Y L . Radio frequency identification development internals:2nd edition[M]. Beijing: Posts and Telecom PressPress, 2012: 1-14.
|
[2] |
GAO L , MA M , SHU Y ,et al. An ultralight weight RFID authentication protocol with CRC and permutation[J]. Journal of Network and Computer Applications, 2014(41): 37-46.
|
[3] |
肖锋, 周亚建, 周景贤 ,等. 标准模型下可证明安全的RFID 双向认证协议[J]. 通信学报, 2013,34(4): 82-87.
|
|
XIAO F , ZHOU Y J , ZHOU J X ,et al. Provable secure mutual authentication protocol for RFID in the standard model[J]. Journal on Communications, 2013,34(4): 82-87.
|
[4] |
LIAO Y P , HSIAO C M . A secure ECC-based RFID authentication scheme integrated with ID-verifier transfer protocol[J]. Ad Hoc Networks, 2014(18): 133-146.
|
[5] |
张敏 . 基于物联网技术下的图书管理系统构建[J]. 河南理工大学学报(自然科学版), 2012,31(3): 326-329.
|
|
ZHANG M . Research on system library management based on technology of internet of things[J]. Journal of Henan Polytechnic University (Natural Science), 2012,31(3): 326-329.
|
[6] |
SARMA S , WEIS S , ENGELS D . RFID systems and security and privacy implications[C]// The 4th International Workshop on Cryptographic Hardware and Embedded Systems,August 13-15,2002,Redwood Shores,CA,USA. Berlin:Springer, 2002: 454-469.
|
[7] |
WEIS S A , SARMA S E , RIVEST R L ,et al. Security and privacy aspects of low-cost radio frequency identification systems[C]// The 1st Security in Pervasive Computing,March 12-14,2003,Boppard,Germany. Berlin:Springer, 2003: 201-212.
|
[8] |
GAO X , XIANG Z , WANG H ,et al. An approach to security and privacy of RFID system for supply chain[C]// 2004 IEEE International Conference on E-Commerce Technology for Dynamic E-Business,September 13-15,2004,Beijing,China. New Jersey:IEEE Press, 2004: 164-168.
|
[9] |
HENRICI D , MAULLER P . Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers[C]// The 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops,March 14-17,2004,Los Alamitos,CA,USA. New Jersey:IEEE Press, 2004.
|
[10] |
LEE S M , HWANG Y J , LEE D H ,et al. Efficient authentication for low-cost RFID systems[C]// The 2005 International Conference on Computational Science and its Applications,May 9-12,2005,Singapore. Berlin:Springer, 2005: 619-627.
|
[11] |
陶源, 周喜, 马玉鹏 ,等. 基于散列函数的移动双向认证协议[J]. 计算机应用, 2016,36(3): 657-660.
|
|
TAO Y , ZHOU X , MA Y P ,et al. Mobile mutual authentication protocol based on Hash function[J]. Journal of Computer Applications, 2016,36(3): 657-660.
|
[12] |
王明斐, 魏勇, 孙挺 . 基于散列函数和排列的轻量级RFID安全认证协议[J]. 湘潭大学自然科学学报, 2016(1): 115-119.
|
|
WANG M F , WEI Y , SUN T . A lightweight RFID security authentication protocol based on Hash function and arrangement[J]. Natural Science Journal of Xiangtan University, 2016(1): 115-119.
|
[13] |
朱洪岩, 谢晓尧, 吴景春 . 基于散列函数的RFID安全认证协议改进[J]. 长江大学学报(自然科学版), 2016,13(13): 39-43.
|
|
ZHU H Y , XIE X Y , WU J C . RFID authentication protocol development based on Hash function[J]. Journal of Yangtze University (Natural Science Edition), 2016,13(13): 39-43.
|
[14] |
赵太飞, 邹波, 尹航 . 基于散列链的RFID认证协议[J]. 微型机与应用, 2016,35(19): 60-63.
|
|
ZHAO T F , ZOU B , YIN H . RFID authentication protocol based on Hash chain[J]. Microcomputer and its Applications, 2016,35(19): 60-63.
|