[1]SARMA S E, WEIS S A, ENGELS D W. RFID systems and security and privacy implications [C]// Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems. Berlin: Springer, 2002: 454-469.[2]WEIS S A, SARMA S E, RIVEST R L, et al. Security and privacy aspects of low-cost radio frequency identification systems [C]// Proceedings of the First International Conference Security in Pervasive Computing. Berlin: Springer, 2003: 201-212.[3]OHKUBO M, SUZUKI K, KINOSHITA S. Cryptographic approach to “privacy-friendly” tags [EB/OL]. [2012-03-22]. http://www.rfidprivacy.org/papers/ohkubo.pdf.[4]丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,46(4):583-592.[5]KARTHIKEYAN S, NESTERENKO M. RFID security without extensive cryptography [C]// Proceedings of the 3rd ACM workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2005: 63-67.[6]张帆,孙璇,马建峰,等.供应链环境下通用可组合安全的RFID通信协议[J].计算机学报,2008,31(10):1754-1767.[7]BURMESTER M, van LE T, de MEDEIROS B. Provably secure ubiquitous systems: universally composable RFID authentication protocols [C]// Proceedings of the 2nd IEEE/CreateNet International Conference on Security and Privacy in Communication Networks. 〖HJ1.75mm〗Washington, DC: IEEE Computer Society, 2006: 176-186.[8]van LE T, BURMENTER M, de MEDEIROS B. Universally composable and forward-secure RFID authentication and authenticated key exchange [C]// Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. New York: ACM Press, 2007: 242-252.[9]邓淼磊,马建峰,周利华.RFID匿名认证协议的设计[J].通信学报,2009,30(7):20-26.[10]CHEN Y L, CHOU J S, SUN H M. A novel mutual authentication scheme based on quadratic residues for RFID systems [J]. Computer Networks, 2008, 52(12): 2373-2380.[11]LI X F, BAI E J, XIE Y H. A novel authentication protocol with soundness and high efficiency for security problems [C]// Proceedings of the 4th International Conference on Wireless Communications, Networking and Mobile Computing. Washington, DC: IEEE Computer Society, 2008: 1-3.[12]张恒山,常军,管会生.基于混合加密方法的RFID安全认证协议[J].计算机工程,2011,37(1):134-136.[13]王明辉,王建东.高效的RFID双向认证协议[J].计算机应用,2011,31(10):2694-2696.[14]丁治国,郭立,王星洁.基于密钥阵列的RFID安全认证协议[J].电子与信息学报,2009,31(3):722-726.[15]王云峰,焦保盈,李杰,等.RFID系统可扩展安全认证协议研究[J].河北工业大学学报,2009,38(5):1-5.[16]聂鹏.EPCglobal Class1 Gen2标准的RFID高效双向认证协议[J].计算机工程与应用,2011,47(10):92-94.[17]BURROWS M, ABADI M, NEEDHAM R. A logic of authentication [J]. ACM Transactions on Computer Systems, 1990, 8(1):18-36. |