HUANG H F, YU P K, and LIU K C. A privacy and authentication protocol for mobile RFID system[C]. 2014 IEEE International Symposium on Independent Computing, IEEE, Orlando, USA, 2014: 1-6.
|
NYALAMADUGU S, LIU J, and DE VELASCO CORTINA F M. Methods and apparatus for preserving privacy in an RFID system[P]. U.S. Patent 8710960. 2014.
|
LI N, MU Y, SUSILO W, et al. Privacy-preserving Authorized RFID Authentication Protocols[M]. Radio Frequency Identification: Security and Privacy Issues. Springer International Publishing, Berlin, Germany, 2014: 108-122.
|
PERIS-LOPEZ P, ORFILA A, PALOMAR E, et al. A secure distance-based RFID identification protocol with an off-line back-end database[J]. Personal and Ubiquitous Computing, 2012, 16(3): 351-365.
|
HAN S, DILLON T, POTDAR V, et al. RFID mutual authentication protocols for tags and readers with and without a server[J]. Computer Systems Science and Engineering, 2013, 28(2): 91-99.
|
CHO J S, YEO S S, and KIM S K. Securing against brute- force attack: A hash-based RFID mutual authentication protocol using a secret value[J]. Computer Communications, 2011, 34(3): 391-397.
|
CHO J S, JEONG Y S, and PARK S O. Consideration on the brute-force attack cost and retrieval cost: A hash-based radio- frequency identification (RFID) tag mutual authentication protocol[J]. Computers Mathematics with Applications, 2012: 1-8.
|
Kim H. RFID mutual authentication protocol based on synchronized secret[J]. International Journal of Security Its Applications, 2013, 7(4): 37-49.
|
SAFKHANI M, PERIS-LOPEZ P, HERNANDEZ-CASTRO J C, et al. Cryptanalysis of the Cho et al. protocol: a hash-based RFID tag mutual authentication protocol[J]. Journal of Computational and Applied Mathematics, 2014, 259: 571-577.
|
周晔. 基于Hash链的RFID双向认证协议研究[D]. [硕士论文], 西南交通大学, 2012.
|
ZHOU Y. Research on RFID mutual authentication protocol based on Hash chain[D]. [Master dissertation], South West Jiaotong University, 2012.
|
丁振华, 李锦涛, 冯波. 基于 Hash 函数的 RFID 安全认证协议研究[J]. 计算机研究与发展, 2009, 46(4): 583-592.
|
DING Z, LI J, and FENG B. Research on Hash-based RFID security authentication protocol[J]. Journal of Computer Research and Development, 2009, 46(4): 583-592.
|
孙肖, 赵泽茂. 一种基于哈希函数的RFID双向认证协议[J]. 杭州电子科技大学学报, 2012, 32(6): 29-32.
|
SUN X and ZHAO Z. A Hash-based mutual authentication protocol for the RFID system[J]. Journal of Hangzhou Dianzi University, 2012, 32(6): 29-32.
|
蔡豪. RFID安全认证协议的研究与设计[D]. [硕士论文], 华中科技大学, 2010.
|
CAI H. Studies on RFID security authentication protocol[D]. [Master dissertation], Huazhong University of Science Technology, 2010.
|
李斌. RFID安全协议的研究[D]. [硕士论文], 复旦大学, 2012.
|
LI B. Research on RFID security protocol[D]. [Master dissertation], Fudan University, 2012.
|
信息技术射频识别800/900 MHz空中接口协议[S]. 北京: 中国标准出版社, 2013, GB/T29768-2013.
|
Information technology-radio frequency identification air interface protocol at 800/900 MHz[S]. Beijing: Standards Press of China, 2013, GB/T 29768-2013.
|
WANG J, FLOERKEMEIER C, and SARMA S E. Session-based security enhancement of RFID systems for emerging open-loop applications[J]. Personal and Ubiquitous Computing, 2014, 18(8): 1881-1891.
|
MAMUN M S I and MIYAJI A. A privacypreserving efficient RFID authentication protocol from SLPN assumption[J]. International Journal of Computational Science and Engineering, 2015, 10(3): 234-243.
|
SHOARINEJAD K and SOLTAN M. Systems and methods for RFID security[P]. U.S. Patent Application 14/592,455. 2015-1-8.
|
BURROWS M, ABADI M, and NEEDHAM R M. A logic of authentication[C]. Proceedings of the Royal Society of London. A: Mathematical and Physical Sciences. The Royal Society, London, 1989, 426(1871): 233-271.
|