共 10 条
[1]
Zhou J., Zhou Y., Xiao F., Niu X., Mutual authentication protocol for mobile RFID systems, Journal of Computational Information Systems, 8, pp. 3261-3268, (2012)
[2]
Safkhani M., Bagheri N., Peris-Lopez P., Mitrokotsa A., On the traceability of tags in SUAP RFID authentication protocols, RFID-Technologies and Applications (RFID-TA), 2012 IEEE International Conference on RFID-Technologies and Applications, pp. 292-296, (2012)
[3]
Ahmadian Z., Salmasizadeh M., Aref M.R., Desynchronization attack on RAPP ultra-lightweight authentication protocol, Information Processing Letters, 113, pp. 205-209, (2013)
[4]
Lowe G., Casper: A compiler for the analysis of security protocols, Journal of Computer Security, 6, pp. 53-84, (1998)
[5]
Garcia F.D., Hasuo I., Pieters W., van Rossum P., Provable anonymity, Proceedings of the 2005 ACM Workshop on Formal Methods in Security Engineering, pp. 63-72, (2005)
[6]
Abadi M., Cortier V., Deciding knowledge in security protocols under equational theories, Theoretical Computer Science, 367, pp. 2-32, (2006)
[7]
Arapinis M., Chothia T., Ritter E., Ryan M., Analysing unlinkability and anonymity using the applied pi calculus, Computer Security Foundations Symposium (CSF), 2010 23rd IEEE, pp. 107-121, (2010)
[8]
Bruso M., Chatzikokolakis K., den Hartog J., Formal verification of privacy for RFID systems, Computer Security Foundations Symposium (CSF), 2010 23rd IEEE, pp. 75-88, (2010)
[9]
Ma C., Li Y., Deng R.H., Li T., RFID privacy: Relation between two notions, minimal condition, and efficient construction, Proceedings of the 16th ACM Conference on Computer and Communications Security, pp. 54-65, (2009)
[10]
van Deursen T., Mauw S., Radomirovic S., Untraceability of RFID protocols, Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, pp. 1-15, (2008)