共 13 条
[1]
Wang L., Yi X., Lv C., Guo Y., Security Improvement in Authentication Protocol for Gen-2 Based RFID System, Journal of Convergence Information Technology, AICIT, 6, 1, pp. 157-169, (2011)
[2]
Juels A., RFID Security and Privacy: A Research Survey, Journal of Selected Areas in Communications, Institute of Electrical and Electronics Engineers, 24, pp. 381-394, (2006)
[3]
Bondi A.B., Characteristics of Scalability and Their Impact on Performance, Proceedings of the Second International Workshop on Software and Performance-WOSP 2000, pp. 195-203, (2000)
[4]
Song B., Mitchell C.J., Scalable RFID Security Protocols Supporting Tag Ownership Transfer, Computer Communications, Elsevier, 34, pp. 556-566, (2010)
[5]
Jialiang H., Dantong O., Yuxin Y., An Efficient Lightweight RFID Authentication Protocol for Low-cost Tags, Advances in Information Sciences and Service Sciences, AICIT, 3, 9, pp. 331-338, (2011)
[6]
Dimitriou T., A Lightweight RFID Protocol to Protect against Traceability and Cloning Attacks, Proceedings of Conference on Security and Privacy for Emerging Areas in Communication Networks-SecureComm 2005, pp. 59-66, (2005)
[7]
Tsudik G., YA-TRAP: Yet Another Trivial RFID Authentication Protocol, Proceedings of Fourth IEEE Annual Conference on Pervasive Computing and Communications, pp. 640-643, (2006)
[8]
Song B., Mitchell C.J., RFID Authentication Protocol for Low-cost Tags, Proceedings of First ACM Conference on Wireless Network Security, pp. 140-147, (2008)
[9]
Cho J.-S., Yeo S.-S., Kima S.K., Securing against Brute-force Attack: A Hashbased RFID Mutual Authentication Protocol Using a Secret Value, Journal of Computer Communications, 34, pp. 391-397, (2010)
[10]
Wei C.-H., Hwang M.-S., Chin A.Y.-H., A Mutual Authentication Protocol for RFID, Journal of IT Professional, 3, pp. 20-24, (2011)