[1]DUC D N, LEE H, KIM K. Enhancing security of EPC global GEN-2 RFID tag against traceability and cloning[EB/OL]. [2012-12-20]. http://www.autoidlabs.org/uploads/media/AUTOIDLABS-WP-SWNET-016.pdf.[2]CHIEN H Y, CHEN C H. Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards [J]. Computer Standards and Interfaces, 2007, 29(2): 254-259.[3]PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, TAPIADOR J M E, et al. Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard[J]. Computer Standards and Interfaces,2009, 31(2): 372-380.[4]SARMA S E, WEIS S A, ENGELS D W. RFID systems and security and privacy implications [C]// Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems. Berlin: Springer, 2003: 454-469.[5]SARMA S E, WEIS S A, ENGELS D W. Radio frequency identification: secure risks and challenges [J]. RSA Laboratories Cryptobytes, 2003, 6(1):2-9.[6]WEIS S A, SARMA S E, RIVEST R L, et al. Security and privacy aspects of low-cost radio frequency identification systems [C]// Proceedings of the 1st International Conference on Security in Pervasive Computing. Berlin: Springer, 2004: 201-212.[7]OHKUBO M, SUZUKI K, KINOSHITA S. Hash-chain based forward-secure privacy protection scheme for low-cost RFID [C]// Proceedings of the 4th Symposium on Cryptography and Information Security. Berlin: Springer, 2004: 719-724.[8]CHOI E Y, LEE S M, LEE D H. Efficient RFID authentication protocol for ubiquitous computing environment [C]// EUC 2005: Proceedings of the 2005 International Conference on Embedded and Ubiquitous Computing. Berlin: Springer, 2005: 945-954.[9]FELDHOFER M, DOMINIKUS S, WOLKERSTORFER J. Strong authentication for RFID systems using the AES algorithm [C]// CHES’04: Proceedings of 2004 Cryptographic Hardware and Embedded Systems. Berlin: Springer, 2004: 357-370.[10]GOLLE P, JAKOBSSON M, JUELS A, et al. Universal re-encryption for mixnets [C]// Proceedings of the 2004 RSA Conference, Cryptographer’s Track. Berlin: Springer, 2004: 163-178.[11]STALLINGS W. Computer security: principles and practice [M]. 2nd ed. Upper Saddle River, NJ: Prentice Hall, 2011.[12]裴友林,杨善林.基于密钥矩阵的RFID安全协议[J].计算机工程,2008,34(19):170-173.[13]游相柏,刘毅敏.RFID安全认证协议研究[J].电视技术,2012,36(15):104-107. |