HU Tao WEI Guo-heng. Anonymous bidirectional RFID authentication protocol based on low-cost tags[J]. Journal of Computer Applications, 2012, 32(01): 111-114.
[1]周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,29(4):581-589.[2]赵跃华,王益维,李晓聪.一种适合于低成本标签的RFID双向认证协议[J].计算机应用研究,2010,27(5):1885-1888.[3]周晓光,王晓华,王伟.射频识别(RFID)系统设计、仿真与应用[M].北京:人民邮电出版社,2008.[4]KARTHIKEYAN S, NESTERENKO M. RFID security without extensive cryptography [C]// SASN'05: Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks. New York: ACM Press, 2005: 63-67.[5]CHIEN H-Y, CHEN C-H. Mutual authentication protocol for RFID conforming to EPC Class-1 Generation-2 standards [J]. Computer Standards and Interfaces, 2007, 29(2): 254-259.[6]PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, ESTEVEZ-TAPIADOR J M, et al. Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard [J]. Computer Standards and Interfaces, 2009, 31(2): 372-380.[7]HAN D, KWON D. Vulnerability of an RFID authentication protocol conforming to EPC Class-1 Generation-2 standards [J]. Computer Standards and Interfaces, 2009, 31(4): 648-652.[8]van LE T, MIKE BURNMESTER, BRENO DE MEDEIROS. Universally composable and forward-secure RFID authentication and authenticated key exchange [C]// Proceedings of the Second ACM Symposium on Information. Computer and Communications Security. New York: ACM Press, 2007: 242-252.[9]DUC D N, KIM K. Defending RFID authentication protocol against DoS attacks [J]. Computer Communications, 2011, 34(3): 384-390.[10]AVOINE G. Adversarial model for radio frequency identification [EB/OL]. (2005-01-01)[2010-05-15]. http://eprint.iacr.org.[11]聂鹏.EPCglobal Class 1 Gen 2标准的RFID高效双向认证协议[J].计算机工程与应用,2011,47(10):92-94.