[1]
SARMA S E, WEIS S A, ENGELS D W. RFID systems and security and privacy implications[C]// Proceedings of CHES02 Revised Papers from the 4th International Workshop on Cryptographic Hardware and Embedded Systems. London: Springer-Verlag, 2003:454-469.
[2]
SARMA S E, WEIS S A, ENGELS D W. Radio-frequency identification: Secure risks and challenges[J]. RSA Laboratories CryptoBytes, 2003, 6(1): 2-9.
[3]
WEIS S A, SARMA S E, RIVEST R L. Security and privacy aspects of low-cost radio frequency identification systems[C]// Security in Pervasive Computing, LNCS 2802. Berlin: Springer-Verlag, 2004:201-212.
[4]
EPCglobal. The EPCglobal architecture framework[S/OL]. [2011-11-06]. http://www. epcglobalinc.org/standards/architecture/architecture_1_3-framework-20090319. pdf.
[5]
BURROWS M, ABADI M, NEEDHAM R. A logic of authentication[J]. ACM Transactions in Computer Systems,1990,9(1):18-36.
[6]
PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, TAPIADOR J E, et al. Weaknesses in two recent lightweight RFID authentication protocols[C]// Inscrypt09: Proceedings of the 5th International Conference on Information Security and Cryptology. Berlin: Springer-Verlag, 2009: 383-392.
[7]
CHEN C-L, DENG Y-Y. Conformation of EPC class 1 and generation 2 standards RFID system with mutual authentication and privacy protection[J]. Engineering Applications of Artificial Intelligence, 2009, 22(8):1284-1291.
[8]
BURMESTER M, de MEDEIROS B, MUNILLA J, et al. Secure EPC Gen2 compliant radio frequency identification[C]// ADHOC-NOW09: Proceedings of the 8th International Conference on Ad-Hoc, Mobile and Wireless Networks. Berlin: Springer-Verlag, 2009:227-240.
[9]
PIRAMUTHU S. RFID mutual authentication protocols[J]. Decision Support Systems, 2011, 50(2):387-393.
[10]
邓淼磊, 黄照鹤, 鲁志波. EPC Gen2标准下安全的RFID认证协议[J]. 计算机科学, 2010, 37(7):115-117.
[11]
MITRA M. Privacy for RFID systems to prevent tracking and cloning[J]. International Journal of Computer Science and Network Security, 2008,8(1):1-5. |