[1]JUELS A, WEIS S A. Authenticating pervasive devices with human protocols[C]// CRYPTO 2005: Proceedings of 25th Annual International Cryptology Conference, LNCS 3621. Berlin: Springer-Verlag, 2005:293-308.[2]SARMA S, WEIS S, ENGELS D. Radio frequency identification: Secure risks and challenges[J]. RSA Laboratories Cryptobytes, 2003,6(1):2-9.[3]WEIS S A, SARMA S E, RIVEST R L, et al. Security and privacy aspects of low-cost radio frequency identification systems [C]// Proceedings of the 1st International Conference on Security in Pervasive Computing, LNCS 2802. Berlin: Springer-Verlag,2004:201-212.[4]OHKUBO M, SUZUKI K, KINOSHITA S. Hash-chain based forward-secure privacy protection scheme for low-cost RFID[C]// SCIS 2004: Proceedings of the 2004 Symposium on Cryptography and Information Security.Berlin: Springer-Verlag,2004:719-724.[5]MOLNAR D, WAGNER D. Privacy and security in library RFID: Issues, practices, and architectures[C]// CCS'04: Proceedings of the 1th ACM Conference on Computer and Communications Security. New York: ACM Press,2004:210-219.[6]RHEE K, KWAK J, KIM S, et al. Challenge-response based RFID authentication protocol for distributed database environment[C]// SPC 2005: Proceedings of the 2nd International Conference on Security in Pervasive Computing, LNCS 3450. Berlin: Springer-Verlag,2005: 70-84.[7]丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,46(4):583-592.[8]CHIEN H Y. SASI: A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity[J]. IEEE Transactions on Dependable and Secure Computing, 2007,4(4):337-340.[9]YUKSEL K. Universal hashing for ultra-low-power cryptographic hardware applications[D]. Worcester: Worcester Polytechnic Institute, Electrical & Computer Engineering Department, 2004.[10]FELDHOFER M, DOMINIKUS S, WOLKERSTORFER J. Strong authentication for RFID systems using the AES algorithm[C]// Proceedings of CHES. New York: ACM Press, 2004:85-140.[11]SUH G E, DEVADAS D. Physical unclonable functions for device authentication and secret key generation[C]// DAC'07: Proceedings of the 44th Annual Design Automation Conference. New York: ACM Press, 2007:9-14.[12]GASSEND B, CLARKE D, van DIJK M, et al. Silicon physical random functions[C]// Proceedings of the 9th ACM Computer and Communication Security. New York: ACM Press, 2002: 148-160.[13]杨灵,闰大顺. 基于PUF的低成本RFID系统安全协议[J].计算机工程,2010,36(15):148-155.[14]LEONID B, GABRIEL R. Physically unclonable function-based security and privacy in RFID Systems [C]// PerCom'07: Proceedings of the 5th Annual IEEE International Conference on Pervasive Computing and Communications. Piscataway, NJ: IEEE Press,2007: 211-220.[15]RUHRMAIR U, MUNCHEN T, DROR G, et al. Modeling attacks on physical unclonable functions[C]// Proceedings of the 17th ACM Conference on Computer and Communications Security. New York: ACM Press, 2010:237-249. |