共 46 条
[1]
An Y., Oh S., RFID system for user's privacy protection, Proc. of the Asia-pacific Conference on Communications, pp. 516-519, (2005)
[2]
Avoine G., Dysli E., Oechslin P., Reducing time complexity in RFID systems, Proc. of the Workshop on SAC'05 (2005)
[3]
Bringer J., Chabanne H., Dottax E., Hb++: A lightweight authentication protocol secure against some attacks, International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing, pp. 28-33, (2006)
[4]
Burmester M., De Medeiros B., The security of EPC Gen2 compliant RFID protocols, International Conference of Applied Cryptography and Network Security, 5037 LNCS, pp. 490-506, (2008)
[5]
Cao T., Bertino E., Lei H., Security analysis of the SASI protocol, IEEE Transactions on Dependable and Secure Computing, 6, pp. 73-77, (2008)
[6]
Chen C.-L., Den Y.-Y., Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection, Engineering Applications of Artificial Intelligence, 22, pp. 1284-1291, (2009)
[7]
Chen Y.-C., Wang W.-L., Hwang M.-S., RFID authentication protocol for anti-counterfeiting and privacy protection, Proc. of the ICACT'07, pp. 255-259, (2007)
[8]
Chen Y., Chou J.-S., Sun H.-M., A novel mutual authentication scheme based on quadratic residues for RFID systems, Computer Networks, 52, 12, pp. 2373-2380, (2008)
[9]
Chien H.-Y., Chen C.-H., Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards, Computer Standards & Interfaces, 29, pp. 254-259, (2007)
[10]
Chien H.-Y., Huang C.-W., Security of ultra-lightweight RFID authentication protocols and its improvements, ACMSIGOPS Operating System Review, 41, pp. 83-86, (2007)