[1] 谢锦彪,欧毓毅,凌捷. 一种改进的基于Hash函数的RFID双向认证协议[J]. 广东工业大学学报, 2014,31(3):62-66.
[2] 鲜明,包卫东,王永杰,等. 网络攻击效果评估导论[M]. 长沙:国防科技大学出版社, 2007.
[3] 周永彬,冯登国. RFID安全协议的设计与分析[J]. 计算机学报, 2006,29(4):581-589.
[4] 刘明生,王艳,赵新生. 基于Hash函数的RFID安全认证协议的研究[J]. 传感技术学报, 2011,24(9):1317-1321.
[5] WEIS S A, SARMA S E, RIVEST R L, et al. Security and privacy aspects of low-cost radio frequency identification systems[J]. Lecture Notes in Computerence, 2003,2802:201-212.
[6] OHKUBO M, SUZUKI K, KINOSHITA S. Hash chain based forward secure privacy protection scheme for low cost RFID[C]// Proceedings of the 2004 Symposium on Cryptography and Information Security. 2004:719-724.
[7] 杨传明. 基于随机Hash锁的RFID算法研究[J]. 微计算机信息, 2009,25(14):192-193.
[8] 曾丽华,熊璋,张挺. Key值更新随机Hash锁对RFID安全隐私的加强[J]. 计算机工程, 2007,33(3):151-153.
[9] 白煜,滕建辅,张立毅,等. 基于Hash锁的同步强化RFID验证协议[J]. 计算机工程, 2009,35(21):138-139.
[10] OUYANG C Q, WU J X, LI Z Y, et al. An enhanced security authentication protocol based on hash-lock for low-cost RFID[C]// 2008 2nd International Conference on Anti-counterfeiting, Security and Identification. 2008:416-419.
[11]GAO Q, MA W P, LUO W, et al. Hash chain improvement of key predistribution schemes based on transversal designs[J]. IEICE Transactions on Fundamentals of Electronics Communications & Computer Sciences, 2018,E101.A(1):157-159.
[12]裴友林,余本功. 基于随机Hash链的RFID安全协议研究[J]. 微计算机信息, 2008,24(29):194-196.
[13]SAXENA M, SHAW RN, VERMA J K. A novel hash-based mutual RFID tag authentication protocol: Proceedings of GUCON 2018[M]// Data and Communication Networks. 2019:1-12.
[14]杨海东,杨春. RFID安全问题研究[J]. 微计算机信息, 2008,24(2,3):238-240.
[15]YANG X, SHEN X M, SUN B, et al. Security and privacy in RFID and applications in telemedicine[J]. IEEE Communications Magazine, 2006(4):1-4.
[16]张兵,马新新,秦志光. 基于Hash运算的RFID认证协议分析和改进[J]. 计算机应用研究, 2011,28(11):4311-4314.
[17]YANG L Q, WU Q Q, BAI Y J, et al. An improved Hash-based RFID two-way security authentication protocol and application in remote education[J]. Journal of Intelligent and Fuzzy Systems, 2016,31(5):2713-2720.
[18]赵太飞,邹波,尹航. 基于Hash链的RFID认证协议[J]. 微型机与应用, 2016,35(19):60-63.
[19]陈庄,陈亚茹. 基于Hash实现低成本RFID的SRFID安全方案[J]. 重庆理工大学学报(自然科学), 2017,31(12):140-145.
[20]RIEBACK M R, CRISPO B, TANENBAUM A S. The evolution of RFID security[J]. IEEE Pervasive Computing, 2006,5(1):62-69.
[21]RHEE K, KWAK J, KIM S. Challenge-response based RFID authentication protocol for distributed database environment[C]// Proceedings of the 2nd Intenational Conference on Security in Pervasive Computing. 2005:70-84.
[22]SHEN J, TAN H W, ZHENG Y H, et al. An enhanced ID-updating Hash-based RFID authentication protocol with strong privacy protection[J]. Frontiers in Artificial Intelligence and Applications, 2015,274:2070-2079.
[23]丁振华,李锦涛,冯波,等. 基于Hash函数的RFID安全认证协议研究[J]. 计算机研究与发展, 2009,46(4):583-592.
|