[1] Bondi A.Characteristics of scalability and their impact on performance[C]//Proceedings of the Second International Workshop on Software and Performance-WOSP 2000.Ottawa: ACM Press,2000: 195-203.[2] Osaka K,Takagi T,Yamazaki K,et al.An efficient and secure RFID security method with ownership transfer[C]//Proc International Conference on Computational Intelligence and Security,Volume 2.Piscataway: IEEE Press,2006: 1090-1095.[3] Lei Hong,Cao Tianjie.RFID protocol enabling ownership transfer to protect against traceability and DoS attacks[C]//Proc the First International Symposium on Data,Privacy,and E-Commerce.Washington DC: IEEE Computer Society Press,2007: 508-510.[4] Wang C H,Chin S.A new RFID authentication protocol with ownership transfer in an insecure communication environment[J].Proc Hybrid Intelligent Systems,9th International Conference,2009,1(8): 486-491.[5] Yang M H.Across-authority lightweight ownership transfer protocol[J].Electronic Commerce Research and Applications,2011: 375-383.[6] Peris-Lopez P,Hernandez-Castro J C,Tapiador J M E,et al.Vulnerability analysis of RFID protocols for tag ownership transfer[J].Computer Networks,2010,54(9): 1502-1508.[7] Song B,Mitchell C J.Scalable RFID security protocols supporting tag ownership transfer[J].Computer Communications,2011,34(4): 556-566.[8] Han D G,Takagi T,Kim H W,et al.New security problem in RFID systems tag killing[C]//Proc in ACIS 2006.Springer-Verlag: LNCS 3982,2006: 375-384. |