共 37 条
[1]
Armknecht F., Sadeghi A.R., Visconti I., Wachsmann C., On RFID privacy with mutual authentication and tag corruption, LNCS, 6123, pp. 493-510, (2010)
[2]
Innovative IDIC Solutions, (2007)
[3]
Avoine G., Adversarial model for radio frequency identification. ePrint, Report 2005/049, (2005)
[4]
Avoine G., Lauradoux C., Martin T., When compromised readers meet RFID, The 5th Workshop on RFID Security (RFIDSec), (2009)
[5]
Bellare M., Fischlin M., Goldwasser S., Micali S., Identification protocols secure against reset attacks, LNCS, 2045, pp. 495-511, (2001)
[6]
Blundo C., Persiano G., Sadeghi A.R., Visconti I., Improved security notions and protocols for non-transferable identification, LNCS, 5283, pp. 364-378, (2008)
[7]
Bringer J., Chabanne H., Icart T., Efficient zero-knowledge identification schemes which respect privacy, Proceedings of ASIACCS 2009, pp. 195-205, (2009)
[8]
Burmester M., Van Le T., De Medeiros B., Universally composable and forward-secure RFID authentication and authenticated key exchange, Proc. of ASIACCS, pp. 242-252, (2007)
[9]
Canetti R., Goldreich O., Goldwasser S., Micali S., Resettable zero-knowledge (extended abstract), STOC, pp. 235-244, (2000)
[10]
D'Arco P., Scafuro A., Visconti I., Revisiting DoS Attacks and Privacy in RFID-Enabled Networks, LNCS, 5804, pp. 76-87, (2009)