[1]张学军,蔡文琦,王锁萍.改进型自适应多叉树防碰撞算法研究[J].电子学报,2012,40(1):193-198.[2]WEIS S A,SARMA S E,RIVEST R L,et al.Security and privacy aspects of low-cost radio frequency identification systems[C]// Proceedings of the 1st International Conference on Security in Pervasive Computing.Berlin:Springer-Verlag,2004:201-212.[3]SARMA S E,WEIS S A,ENGELS D W.Radio frequency identification:Secure risks and challenges[J].Cryptobytes,2003,6(1):2-9.[4]TOIRUUL B,LEE K O.An advanced mutual-authentication algorithm using AES for RFID systems[J].International Journal of Computer Science and Network Security,2006,6(9B):156-162.[5]MUBARAK M F,MANAN J A,YAHYA S.Mutual attestation using TPM for trusted RFID protocol[C]// NETAPPS:Proceedings of 2010 the 2nd International Conference on Network Applications Protocols and Services.Piscataway,NJ:IEEE Press,2010:153-158.[6]SARMA S E,WEIS S A,ENGELS D W.RFID systems and security and privacy implications[C]// CHES '02:Proceedings of Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems.Berlin:Springer-Verlag,2003:454-469.[7]OHKUBO M,SUZUKI K,KINOSHITA S.Hash-chain based forward-secure privacy protection scheme for low-cost RFID[C]// Proceedings of the 2004 Symposium on Cryptography and Information Security.Washington,DC:IEEE Computer Society,2004:719-724.[8]CHIEN H Y.SASI:A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity [J].IEEE Transactions on Dependable and Secure Computing,2007,4(4):337-340.[9]D'ARCO P,de SANTIS A.On ultralightweight RFID authentication protocols [J].IEEE Transactions on Dependable and Secure Computing,2011,8(4):548-563.[10]SUN H-M,TING W-C,WANG K-H.On the security of Chien's ultralightweight RFID authentication protocol [J].IEEE Transactions on Dependable and Secure Computing,2011,8(2):315-317.[11]BILAL Z,MASOOD A,KAUSAR F.Security analysis of ultra-lightweight cryptographic protocol for low-cost RFID tags:Gossamer protocol [C]// NBIS '09:Proceedings of the 2009 International Conference on Network-based Information Systems.Washington,DC:IEEE Computer Society,2009:260-267.[12]PERIS-LOPEZ P,HERNANDEZ-CASTRO J C,ESTEVEZ-TAPIADOR J M.et al.EMAP:An efficient mutual authentication protocol for low-cost RFID tags [C]// Proceedings of OTM Federated Conference and Workshop.Berlin:Springer-Verlag,2006:352-361.[13]PERIS-LOPEZ P,HERNANDEZ-CASTRO J C,ESTEVEZ-TAPIADOR J M,et al.M2AP:A minimalist mutual-authentication protocol for low-cost RFID tags [C]// Proceedings of International Conference on Ubiquitous Intelligence and Computing.Berlin:Springer-Verlag,2006:912-923.[14]BOUMERDASSI S,DIOP P K,RENAULT E,et al.T2MAP:A two-message mutual authentication protocol for low-cost RFID sensor networks [C]// Proceedings of IEEE the 64th Vehicular Technology Conference.Piscataway,NJ:IEEE Press,2006:2614-2618.[15]BURROWS M,ABADI M,NEEDHAM R.A logic of authentication[J].ACM Transactions on Computer System,1990,8(1):18-36.[16]LIGETI P,BARASZ M,NAGY D,et al.Passive attack against the M2AP mutual authentication protocol for RFID tags [EB/OL].[2010-10-10].http://www.eurasip.org/Proceedings/Ext/RFID2007/pdf/s5p3.pdf.[17]LI TIEYAN,DENG ROBERT.Vulnerability analysis of EMAP — An efficient RFID mutual authentication protocol [C]// ARES '07:Proceedings of the 2nd International Conference on Availability,Reliability and Security.Washington,DC:IEEE Computer Society,2007:238-245. |