[1] Sarma S E, Weis S A, Engels D W. RFID systems and security and privacy implications [C]// The 4th International Workshop on Cryptographic Hardware and Embedded Systems. 2003:454-469.
[2] Weis S A, Sarma S E, Rivest R L, et al. Security and privacy aspects of low-cost radio frequency identification systems [J]. Lecture Notes in Computer Science, 2003,2802:201-212.
[3] Ohkubo B M, Suzuki K, Kinoshita S. Hash-chain based forward-secure privacy protection scheme for low-cost RFID [C]// Proceedings of the Symposium on Cryptography & Information Security. 2004:719-724.
[4] Dimitriou T. A secure and efficient RFID protocol that could make big brother (partially) obsolete[C]// Proceedings of the 4th Annual IEEE International Conference on Pervasive Computing and Communications. 2006:269-275.
[5] Molnar D, Soppera A, Wagne D. A scalable, delegatable pseudonym protocol enabling ownership transfer of RFID tags[C]// Proceedings of the 12th International Conference on Selected Areas in Cryptography. 2005:276-290.
[6] Hopper N J, Blum M. Secure human identification protocols [C]// Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology. 2001:52-66
[7] Juels A, Weis S A. Authenticating pervasive devices with human protocols[C]// Advances in Cryptology-CRYPTO 2005, Springer Berlin Heidelberg. 2005:293-308.
[8] Bringer J, Chabanne H, Dottax E. HB^+^+: A lightweight authentication protocol secure against some attacks [C]// Proceedings of the 2nd International Workshop on Security, Privacy and Trust in Pervasive and Ubiquitous Computing. 2006:28-33
[9] Peris-Lopez P, Hernandez-Castro J C, Estevez-Tapiador J M, et al. LMAP: A real lightweight mutual authentication protocol for low-cost RFID tags[C]// Workshop on RFID Security, 2006. 2006:12-14.
[10]Peris-Lopez P, Hernandez-Castro J C, Estevez-Tapiador J M, et al. EMAP: An efficient mutual-authentication protocol for low-cost RFID tags[C]// Proceedings of the 2006 International Conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONE. 2006:352-361.
[11]Peris-Lopez P, Hernandez-Castro J C, Estevez-Tapiador J M, et al. M2AP: A minimalist mutual-authentication protocol for low-cost RFID tags [C]// Proceedings of the 3rd International Conference on Ubiquitous Intelligence and Computing. 2006:912-923
[12]Yeh Tzu-chang, Wu Chien-hung, Tseng Yuh-min. Improvement of the RFID authentication scheme based on quadratic residues[J]. Computer Communications, 2011,34(3):337-341.
[13]Chang Ya-fen, Lin Shao-cian, Chang Pei-yu. A location-privacy-protected RFID authentication scheme[C]// 2011 IEEE International Conference on Communications(ICC). 2011:1-4.
[14]Doss R, Sundaresan S, Zhou Wanlei. A practical quadratic residues based scheme for authentication and privacy in mobile RFID systems[J]. Ad Hoc Networks, 2013,11(1):383-396.
[15]Liu A T, Chang H K C, Lo Y S, et al. The increase of RFID privacy and security with mutual authentication mechanism in supply chain management[J]. International Journal of Electronic Business Management, 2012,10(1):1-7.
[16]Niu Ben, Zhu Xiaoyan, Chi Haotian, et al. Privacy and authentication protocol for mobile RFID systems[J]. Wireless Personal Communications: An International Journa, 2014,77(3):1713-1731.
[17]Burrows M, Abadi M, Needham R M. A logic of authentication [C]// Proceedings of the 12th ACM Symposium on Operating Systems Principles. 1989:1-13.
[18]Li Gong, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols[C]// 2012 IEEE Symposium on Security and Privacy. 1990:234-248. |