共 25 条
[1]
Want R., An introduction to RFID technology, IEEE Pervasive Computing, 5, 1, pp. 25-33, (2006)
[2]
Weinstein R., RFID: A technical overview and its application to the enterprise, IT Professional, 7, 3, pp. 27-33, (2005)
[3]
Spiekermann S., Evdokimov S., Critical RFID privacy-enhancing technologies, IEEE Security & Privacy, 7, 2, pp. 56-62, (2009)
[4]
Paise R.I., Vaudenay S., Mutual Authentication in RFID: Security and Privacy. Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS'08), Mar 18-20, 2008, Tokyo, Japan, pp. 292-299, (2008)
[5]
Peris-Lopez P., Hernandez-Castro J.C., Estevez-Tapiador J.M., Et al., RFID Systems: A Survey on Security Threats and Proposed Solutions. Processing of the IFIP 11th International Conference on Personal Wireless Communications (PWC'06), Sept 20-22, 2006, Albacete, Spain. LNCS 4217, pp. 159-170, (2006)
[6]
Phan R.C.W., Wu J., Ouafi K., Et al., Privacy analysis of forward and backward untraceable RFID authentication schemes, Wireless Personal Communications: An International Journal, 61, 1, pp. 69-81, (2011)
[7]
Yu Y.C., Hou T.W., Chiang T.C., Low cost RFID real lightweight binding proof protocol for medication errors and patient safety, Journal of Medical Systems, 36, 2, pp. 823-828, (2012)
[8]
Kapoor G., Zhou W., Piramuthu S., Multi-tag and multi-owner RFID ownership transfer in supply chains, Decision Support Systems, 52, 1, pp. 258-270, (2011)
[9]
Chen T.H., Shih W.K., A robust mutual authentication protocol for wireless sensor networks, ETRI Journal, 32, 5, pp. 704-712, (2010)
[10]
Pham T.A., Hasan M.S., Yu H.N., A RFID Mutual Authentication Protocol Based on AES Algorithm. Proceedings of the 2012 UKACC International Conference on Control. Sept 3-5, 2012, Cardiff, UK, pp. 997-1002, (2012)