共 26 条
[1]
Henrici D., RFID Security and Privacy: Concepts, Protocols, and Architectures, (2008)
[2]
Zhou Y., Feng D., Design and analysis of cryptographic protocols for RFID, Chinese Journal of Computers, 29, 4, pp. 581-590, (2006)
[3]
Berbain C., Billet O., Etrog J., Et al., An efficient forward private RFID protocol, pp. 43-53, (2009)
[4]
Peris-Lopez P., Hernandez-Castro C., Estevez-Tapiador M., Et al., LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags, pp. 1-12, (2006)
[5]
Chien H.Y., Chen C.H., Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards, Computer Standards & Interfaces, 29, 2, pp. 254-259, (2007)
[6]
Karthikeyan S., Nesterenko M., RFID security without extensive cryptography, pp. 63-67, (2005)
[7]
Duc N., Park J., Lee H., Et al., Enhancing security of EPCglobal Gen-2 RFID tag against traceability and cloning
[8]
Ohkubo M., Suzuki K., Kinoshita S., Cryptographic approach to “ privacy-friendly” tags, pp. 1-9, (2003)
[9]
Ma C., Low cost RFID authentication protocol with forward privacy, Chinese Journal of Computers, 34, 8, pp. 1388-1398, (2011)
[10]
Vaudenay S., On privacy models for RFID, pp. 68-87, (2007)