[1] |
LIM C H , KWON T . Strong and robust RFID authentication enabling perfect ownership transfer[A]. 8th International Conference on Information and Communications Security[C]. Raleigh,NC,USA, 2006. 1-20.
|
[2] |
MOLNAR D , SOPPERA A , WAGNER D . A scalable,delegatable pseudonym protocol enabling ownership transfer of RFID tags[A]. 12th International Workshop onSelected Areas in Cryptography[C]. Kingston,Ont,Canada, 2006. 276-290.
|
[3] |
OSAKA K , TAKAGI T , YAMAZAKI K ,et al. An efficient and secure RFID security method with ownership transfer[A]. Proceedings of IEEE 2006 International Conference on Computational Intelligence and Security[C]. Guangzhou,China, 2006. 1090-1095.
|
[4] |
FOULADGAR S , AFIFI H . An efficient delegation and transfer of ownership protocol for RFID tags[A]. Proceedings of the 1st International EURASIP Workshop on RFID Technology[C]. Vienna,Austria, 2007. 68-93.
|
[5] |
SONG B . RFID tag ownership transfer[EB/OL]. , 2008.
|
[6] |
RIZOMILIOTIS P , REKLEITIS E . Security analysis of the Song—Mitchell authentication protocol for low-cost RFID tags[J]. IEEE Communications Letters, 2009,13(4): 274-276.
|
[7] |
PERIS-LOPEZ P , HEMANDEZ-CASTRO J C , TAPIADOR J M E ,et al. Vulnerability analysis of RFID protocols for tag ownership transfer[J]. Computer Networks, 2010,54(9): 1502-1508.
|
[8] |
SONG B , MITCHELL C J . Scalable RFID security protocols supporting tag ownership transfer[J]. Computer Communications, 2011,34(4): 556-566.
|
[9] |
金永明, 孙惠平, 关志等 . RFID标签所有权转移协议研究[J]. 计算机研究与发展, 2011,48(8): 1400-1405. JIN Y M , SUN H P , GUAN Z ,et al. Ownership transfer protocol for RFID tag[J]. Journal of Computer Research and Development, 2011,48(8): 1400-1405.
|
[10] |
ELKHIYAOUI K , BLASS E O , MOLVA R . ROTIV:RFID ownership transfer with issuer verification[A]. LNCS7055:7th International Workshop on RFID Security and Privacy[C]. Berlin: Springer, 2012. 163-182.
|
[11] |
MORIYAMA D . Cryptanalysis and improvement of a provably secure RFID ownership transfer protocol[A]. LNCS8162:2nd International Workshop on Lightweight Cryptography for Security and Privacy[C]. Berlin: Springer, 2013. 114-129.
|
[12] |
KAPOOR G , PIRAMUTHU S . Single RFID tag ownership transfer protocols[J]. IEEE Transactions on Systems,Man,and Cybernetics–part C:Applications and Reviews, 2012,42(2): 164-173.
|
[13] |
DOSS R , ZHOU W , YU S . Secure RFID tag ownership transfer based on quadratic residues[J]. IEEE Transactions on Information Forensics and Security, 2013,8(2): 390-401.
|
[14] |
CHEN C L , HUAN Y C , JIANG J R . A secure ownership transfer protocol using EPC global Gen-2 RFID[J]. Telecommunication Systems, 2013,53(4): 387-399.
|
[15] |
周永彬, 冯登国 . RFID 安全协议的设计与分析[J]. 计算机学报, 2006,29(4): 581-589. ZHOU Y B , FENG D G . Design and analysis of cryptographic protocols for RFID[J]. Chinese Journal of Computers, 2006,29(4): 581-589.
|
[16] |
邓淼磊, 马建峰, 周利华 . RFID 匿名认证协议的设计[J]. 通信学报, 2009,30(7): 20-26. DENG M L , MA J F , ZHOU L H . Design of anonymous authentication protocol for RFID[J]. Journal on Communications, 2009,30(7): 20-26.
|
[17] |
肖锋, 周亚建, 周景贤 ,等. 标准模型下可证明安全的RFID双向认证协议[J]. 通信学报, 2013,34(4): 82-87. XIAO F , ZHOU Y J , ZHOU J X ,et al. Provable secure mutual authentication protocol for RFID in the standard model[J]. Journal on Communications, 2013,34(4): 82-87.
|
[18] |
CANETTI R . Universally composable security:a new paradigm for cryptographic protocols[A]. Proceedings of the 42nd IEEE Symposium on Foundations of Computer Science[C]. Las Vegas,Nevada,USA, 2001. 136-145.
|
[19] |
张帆, 孙璇, 马建峰 ,等. 供应链环境下通用可组合安全的 RFID 通信协议[J]. 计算机学报, 2008,31(10): 1754-1767. ZHANG F , SUN X , MA J F ,et al. A universally compoable secure RFID communication protocol in supply chains[J]. Chinese Journal of Computers, 2008,31(10): 1754-1767.
|
[20] |
BURMESTER M , TRI V L , DE MEDEIROS B ,et al. Universally composable RFID identification and authentication protocols[J]. ACM Transactions on Information and System Security, 2009,12(4): 1-33.
|
[21] |
BURMESTER M , MUNILLA J . Lightweight RFID authentication with forward and backward security[J]. ACM Transactions on Information and System Security, 2011,14(1): 11.
|
[22] |
张忠, 徐秋亮 . 物联网环境下UC安全的组证明RFID协议[J]. 计算机学报, 2011,34(7): 1188-1194. ZHANG Z , XU Q L . Universally compoable grouping-proof protocol for RFID tags in the Internet of things[J]. Chinese Journal of Computers, 2011,34(7): 1188-1194.
|
[23] |
CANETTI R . Obtaining universally compoable security:towards the bare bones of trust[A]. Proceedings of 13th International Conference on the Theory and Application of Cryptology and Informationsecurity[C]. 2007. 88-112.
|
[24] |
李凤华, 冯涛, 马建峰 . 基于 VSPH 的 UC 不经意传输协议[J]. 通信学报, 2007,28(7): 28-34. LI F H , FENG T , MA J F . Universally composable oblivious transfer protocol based on VSPH[J]. Journal on Communications, 2007,28(7): 28-34.
|
[25] |
张俊伟, 马建峰, 杨力 . UC安全的基于一次签名的广播认证[J]. 通信学报, 2010,31(5): 31-36. ZHANG J W , MA J F , YANG L . UC secure one-time signature based broadcast authentication[J]. Journal on Communications, 2010,31(5): 31-36.
|
[26] |
ZHANG J W , MA J F , MOON S J . Universally composable secure TNC model and EAP-TNC protocol in IF-T[J]. Science China Information Sciences, 2010,53(3): 465-482.
|
[27] |
张俊伟, 马建峰, 杨超 . 安全定位协议的 UC 模型[J]. 通信学报, 2013,34(2): 117-122. ZHANG J W , MA J F , YANG C . UC model of secure positioning protocols[J]. Journal on Communications, 2013,34(2): 117-122.
|