[1] HOPPER N J, BLUM M. Secure human identification protocols[C]// Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security Gold Coast, LNCS 2248. Berlin: Springer-Verlag, 2001: 52-66. [2] JUELS A, WEIS S A. Authenticating pervasive devices with human protocols[C]// Proceedings of the 25th Annual International Cryptology Conference on Advances in Cryptology, LNCS 3621. Berlin: Springer-Verlag, 2005: 293-308. [3] BRINGER J, CHABANNE H, DOTTAX E. HB++: a lightweight authentication protocol secure against some attacks[C]// Proceedings of the Second International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing. Piscataway: IEEE Press, 2006: 28-33. [4] WEIS S A. Security and privacy in radio-frequency identification devices[D]. Boston: Massachusetts Institute of Technology, 2003. [5] WEIS S A, SARMA S E, RIVEST R L, et al. Security and privacy aspects of low-cost radio frequency identification systems[C]// Proceedings of the First International Conference on Security in Pervasive Computing. Berlin: Springer-Verlag, 2004: 201-212. [6] WANG X, LIU J, JIANG X. Mobile RFID security protocol and its GNY logic analysis [J]. Journal of Computer Applications, 2008, 28(9): 2239-2241.(王新锋,刘建国,蒋旭.移动型RFID安全协议及其GNY逻辑分析[J].计算机应用,2008,28(9):2239-2241.) [7] LIU P, ZHANG C, OU Q. Authentication protocol of mobile RFID based on Hash function [J]. Journal of Computer Applications, 2013, 33(5): 1350-1352.(刘鹏,张昌宏,欧庆于.基于Hash函数的移动射频识别互认证安全协议设计[J].计算机应用,2013,33(5):1350-1352.) [8] EPCglobal. EPCTM radio-frequency identity protocols class-1 generation-2 UHF RFID Protocol for Communications at 860 MHz-960 MHz Version 1.2. 0[EB/OL]. [2013-03-10]. http://www.gs1.org/gsmp/kc/epcglobal/uhfc1g2/uhfc1g2_1_2_0-standard-20080511.pdf. [9] YEH T C, WU C H, TSENG Y M. Improvement of the RFID authentication scheme based on quadratic residues[J]. Computer Communications, 2011, 34(3): 337-341. [10] CHANG Y, LIN S, CHANG P. A location-privacy-protected RFID authentication scheme[C]// Proceedings of the 2011 IEEE International Conference on Communications. Piscataway: IEEE Press, 2011: 1-4. [11] DOSS R, SUNDARESAN S, ZHOU W. A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems[J]. Ad Hoc Networks, 2013, 11(1): 383-396. [12] LO Y-S, CHANG H K-C, WANG S-Y. The increase of RFID privacy and security with mutual authentication mechanism in supply chain management[J]. International Journal of Electronic Business Management, 2012, 10(1): 1-4. [13] NIU B, ZHU X, CHI H, et al. Privacy and authentication protocol for mobile RFID systems[J]. Wireless Personal Communications, 2014,77(3): 1-19. |