[1] 周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589.[2] LIM J, OH H, KIM S. A new hash-based RFID mutual authentication protocol providing enhanced user privacy protection [C]// Proceedings of the 4th Information Security Practice and Experience Conference, LNCS 4991. Berlin: Springer-Verlag, 2008: 278-289.[3] CHO J S, YEO S S, KIM S K. Securing against brute-force attack: A hash-based RFID mutual authentication protocol using a secret value [J]. Computer Communications, 2011, 34(3): 391-397.[4] RYU E K, TAKAGI T. A hybrid approach for privacy-preserving RFID tags [J]. Computer Standards and Interfaces, 2009, 31(4): 812-815.[5] ZHOU S J, ZHANG Z, LUO Z W, et al. A lightweight anti-desynchronization RFID authentication protocol [J]. Information Systems Frontiers, 2010, 12(5): 521-528.[6] DUC DN, KIM K. Defending RFID authentication protocols against DoS attacks [J]. Computer Communications, 2011, 34(3): 384-390.[7] van LE T, BURMESTER M, de MEDEIROS B. Universally composable and forward secure RFID authentication and authenticated key exchange [C]// Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. New York: ACM Press, 2007: 242-252.[8] YOON E J. Improvement of the securing RFID systems conforming to EPC Class 1 Generation 2 standard [J]. Expert Systems with Applications, 2012, 39(1): 1589-1594.[9] YEH T C, WANG Y J, KUO T C, et al. Securing RFID systems conforming to EPC Class 1 Generation 2 standard [J]. Expert Systems with Applications, 2010, 37(12): 7678-7683.[10] SONG B, MITCHELL C J. Scalable RFID security protocols supporting tag ownership transfer [J]. Computer Communications, 2011, 34(4): 556-566.[11] FERNNDEZ-MIR A, CASTELL-ROCA J, VIEJO A. Secure and scalable RFID authentication protocol [C]// Proceedings of the 5th International Workshop on Data Privacy Management, LNCS 6514. Berlin: Springer-Verlag, 2011: 231-243.[12] CHIEN H Y, HUANG C W. A lightweight authentication protocol for low-cost RFID [J]. Journal of Signal Processing Systems, 2010, 59(1): 95-102.[13] 丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,45(4):583-592.[14] GONG L, NEEDHAM R, YAHALOM R. Reasoning about belief in cryptographic protocols [C]// Proceedings of the 1990 IEEE Computer Society Synopsis on Research in Security and Privacy. Washington, DC: IEEE Computer Society, 1990: 234-248. |