共 27 条
- [1] Singh A.K., Patro B.D.K., Security of low computing power devices: A survey of requirements, challenges & possible solu-tions, Cybern. Inf. Technol, 19, 1, pp. 133-164, (2019)
- [2] Mukhopadhyay S.C., Internet of Things: Challenges and Op-portunities, 9, pp. 1-17, (2014)
- [3] Lopez J., Roman R., Alcaraz C., Analysis of security threats, requirements, technologies and standards in wireless sensor net-works, Foundations of Security Analysis and Design V, 5705, pp. 289-338, (2009)
- [4] Knospe H., Pohl H., RFID Security, Inf. Secur. Tech. Rep, 9, 4, pp. 39-50, (2004)
- [5] Markantonakis K., Mayes K., Tunstall M., Sauveron D., Piper F., Smart card security, Studies in Computational Intelli-gence, 57, pp. 201-234, (2007)
- [6] Liao Y.P., Hsiao C.M., A secure ECC-based RFID authentication scheme using hybrid protocols, Advances in Intelligent Systems and Applications, Smart Innovation, Systems and Technolo-gies, 21, pp. 1-13, (2013)
- [7] Zhao Z., A secure RFID authentication protocol for healthcare environments using elliptic curve cryptosystem, J. Med. Syst, 38, 5, (2014)
- [8] Alamr A.A., Kausar F., Kim J.S., Secure mutual authentication protocol for RFID based on elliptic curve cryptography, Proc. of International Conference on Platform Technology and Service (PlatCon), pp. 1-7, (2016)
- [9] Jin C., Xu C., Zhang X., Li F., A Secure ECC-based RFID mutual authentication protocol to enhance patient medication safe-ty, J. Med. Syst, 40, 1, (2016)
- [10] Zheng L., Xue Y., Zhang L., Zhang R., Mutual authentication protocol for RFID based on ECC, Proc. of IEEE International Conference on Computational Science and Engineering (CSE) and IEEE International Conference on Embedded and Ubiquitous Computing (EUC), pp. 320-323, (2017)