[1] Liao Y P,Hsiao C M.A secure ECC-based RFId authentication scheme integrated with ID-verifier transfer protocol[J].Ad Hoc Networks,2014,18(7):133-146.
[2] 张学军,王玉,王锁萍,等.基于循环移位的轻量型相互认证协议研究[J].电子学报,2012,40(11):2270-2275. ZHANG Xue-jun,WANG Yu,WANG Suo-ping,et al.Research on the cyclic shift lightweight mutual authentication protocol[J].Acta Electronica Sinica,2012,40(11):2270-2275.(in Chinese)
[3] 钱志鸿,王义君.物联网技术与应用研究[J].电子学报,2012,40(5):1023-1029. QIAN Zhi-hong,WANG Yi-jun.IoT technology and application[J].Acta Electronica Sinica,2012,40(5):1023-1029.(in Chinese)
[4] Doss R,Sundaresan S,Zhou W.A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems[J].Ad Hoc Networks,2013,11(1):383-396.
[5] 周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589. ZHOU Yong-Bin,FENG Deng-Guo.Design and analysis of cryptographic protocols for RFID[J].Chinese Journal of Computers,2006,29(4):581-589.(in Chinese)
[6] Ohkubo M,Suzuki K,Kingships S.Hash-Chain based forward-secure privacy protection scheme for low-cost RFID[A].Proc of Symposium on Cryptography and Information Security[C].Sendai,Japan:SCIS,2004.719-724.
[7] 李辉,侯义斌,黄樟钦,等.一种智能攻击模型在RFID防伪协议中的研究[J].电子学报,2009,37 (11):2565-2573. LI Hui,HOU Yi-bin,HUANG Zhang-qin,et al.Research on the attack model for RFID anti-counterfeit protocol[J].Acta Electronica Sinica,2009,37 (11):2565-2573.(in Chinese)
[8] Cho J S,Yeo S S,Kim S K.Securing against brute-force attack:A hash-based RFID mutual authentication protocol using a secret value[J].Computer Communications,2011,34(3):391-397.
[9] Yeh T C,Wu C H,Tseng Y M.Improvement of the RFID authentication scheme based on quadratic residues[J].Computer Communications,2011,34(3):337-341.
[10] Niu B,Zhu X,Chi H,et al.Privacy and authentication protocol for mobile RFID systems[J].Wireless Personal Communications,2014,77(3):1713-1731.
[11] Sandhya M,Rangaswamy T R.A secure and efficient authentication protocol for mobile RFID systems[J].Journal of Digital Information Management,2011,9(3):99-105.
[12] Lee H C,Eom T Y,Yi J H.Secure and lightweight authentication protocol for mobile RFID privacy[J].Applied Mathematics & Information Sciences,2013,7(1):421-426.
[13] 刘鹏,张昌宏,欧庆于.基于Hash函数的移动射频识别互认证安全协议设计[J].计算机应用,2013,33(5):1350-1352. LIU Peng,ZHANG Changhong,OU Qingyu.Authentication protocol of mobile RFID based on hash function[J].Journal of Computer Applications,2013,33(5):1350-1352.(in Chinese)
[14] Duc D N,Kim K.Defending RFID authentication protocols against DoS attacks[J].Computer Communications,2011,34(3):384-390.
[15] 郭奕旻,李顺东,陈振华,等.一种轻量级隐私保护的 RFID 群组证明协议[J].电子学报,2015,43(2):289-292. GUO Yi-min,LI Shun-dong,CHEN Zhen-hua,et al.A lightweight privacy-preserving grouping proof protocol for RFID systems[J].Acta Electronica Sinica,2015,43(2):289-292.(in Chinese)
[16] 王晨旭,韩良,喻明艳,等.一种适用于RFID标签的安全化密码算法实现[J].电子学报,2014,42(8):1465-1473. WANG Chen-xu,HAN Liang,YU Ming-yan,et al.A secure cipher implementation suitable for RFID-tags[J].Acta Electronica Sinica,2014,42(8):1465-1473.(in Chinese)
[17] 马昌社.前向隐私安全的低成本RFID认证协议[J].计算机学报,2011,34(8):1387-1398. MA Chang-She.Low cost RFID authentication protocol with forward privacy[J].Chinese Journal of Computers,2011,34(8):1387-1398.(in Chinese)
[18] Doss R,Zhou W,Sundaresan S,et al.A minimum disclosure approach to authentication and privacy in RFID systems[J].Computer Networks,2012,56(15):3401-3416. |