共 46 条
[31]
Munilla J., Peinado A., HB-MP: A further step in the HB-family of lightweight authentication protocols, Computer Networks, (2007)
[32]
Ohkubo M., Suzki K., Kinoshita S., Cryptographic approach to privacyfriendly tags, Proc. of the RFID Privacy Workshop, (2003)
[33]
Osaka K., Takagi T., Yamazaki K., Takahashi O., An efficient and secure RFID security method with ownership transfer, Proc. of the IEEE ICCIAS, pp. 1090-1095, (2006)
[34]
Park J.-S., Lee I.-Y., RFID authentication protocol using ID synchronization in insure communication, Proc. of the ICHIT'06, pp. 664-667, (2006)
[35]
Peris-Lopez P., Hernandex-Castro J.C., Estevex-Tapiador J.M., Ribagorda A., LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags, Workshop RF-ID Security, (2006)
[36]
Peris-Lopez P., Hernandex-Castro J.C., Estevex-Tapiador J.M., Ribagorda A., EMAP: An efficient mutual authentication protocol for low-cost tags, Proc. of the OTM Federated Conf. and Workshop: IS Workshop, (2006)
[37]
Peris-Lopez P., Hernandex-Castro J.C., Estevex-Tapiador J.M., Ribagorda A., M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags, Proc. of the UIC'06, pp. 912-923, (2006)
[38]
Peris-Lopez P., Hernandex-Castro J.C., Estevex-Tapiador J.M., Ribagorda A., Advances in ultra-lightweight cryptography for low-cost RFID tags: Gossamer protocol, Proc. of the Workshop Information Security Applications, (2008)
[39]
Peris-Lopez P., Hernandez-Castro J.C., Estevez-Tapiador J.M., Li T., Van Der Lubbe J.C.A., Weaknesses in two recent lightweight RFID authentication protocols, Proc. of Workshop on RFID Security, (2009)
[40]
Phan C.-W., Cryptanalysis of a new ultralightweight RFID authentication protocol - SASI, IEEE Transactions on Dependable and Secure Computing, 6, pp. 316-320, (2009)