[1]Mala H, Dakhilalian M, Shakiba M. Cryptanalysis of mCrypton——A lightweight block cipher for security of RFID tags and sensors[J]. International Journal of Communication Systems, 2012,25(4):415-426.
[2]马昌社. 前向隐私安全的低成本RFID认证协议[J] . 计算机学报, 2011,34(8): 1387-1397.
[3]Panagiotis B, Xin N S, Lajos H. Fixed-complexity quantum assited multi-user detection for CDMA and SDMA[J]. IEEE Transactions on Communications, 2014,62(3):990-1000.
[4]Lalndaluce H, Perallos A, Zuazola I J G. A fast RFID identification with low tag complexity[J]. IEEE Communications Letters, 2013,17 (9) :1704-1706.
[5]刘道微,凌捷,杨昕. 一种改进的满足后向隐私的RFID认证协议[J]. 计算机科学, 2016,43(8): 128-130,158.
[6]王少辉,刘素娟,陈丹伟. 满足后向隐私的可扩展RFID双向认证方案[J]. 计算机研究与发展, 2013,50(6):1276-1284.
[7]Moriyama D, Matsuo S, Ohkubo M. Relations among notions of privacy for RFID authentication protocols[C] // European Symposium on Research in Computer Security. 2012:661-678.
[8]丁振华,李锦涛,冯波. 基于Hash函数的RFID安全认证协议研究[J]. 计算机研究与发展, 2009,46(4):583-592.
[9]Juels A. RFID security and privacy: A research survey[J]. IEEE Journal on Selected Areas in Communications, 2006,24(2):381-394.
[10]翟霞晖,唐明浩,金慧芬,等. 一种基于时隙ALOHA的RFID系统防碰撞算法 [J]. 微计算机信息, 2008(17):239-241.
[11]高树静. 低成本无源RFID安全关键技术研究 [D]. 济南:山东大学,2013.
[12]Yu Songsen, Zhan Yiju, Wang Zhiping, et al. Anti-collision algorithm based on jumping and dynamic searching and its analysis [J]. Computer Engineering, 2005,31(9):19-20.
[13]Myung J H, Lee W J. Adaptive binary splitting: A RFID tag collision arbitration protocol for tag identification [J]. Mobile Networks and Applications, 2006(11):711-722.
[14]沈金伟,凌捷. 一种改进的超轻量级RFID所有权转移协议[J]. 计算机科学, 2014,41(12):125- 128.
[15]Chen W T. A feasible and easy to implement anti-collision algorithm for the EPC global UHF class-1 generation-2 RFID protocol[J]. IEEE Transactions on Automation Science and Engineering, 2014,11(2):485-491.
[16]鲁力. RFID系统密钥无线生成[J]. 计算机学报, 2015,38(4):822-832.
[17]Peris-Lopez P, Hernandez-Castro C, Estevez-Tapiador M, et al. LMAP:A real lightweight mutual authentication protocol for low-cost FID tags [C]// Proceedings of the 2nd Workshop on RFID Security. 2006:1-12. |