[1] 周世杰, 张文清, 罗嘉庆. 射频识别隐私保护技术综述[J]. 软件学报, 2015, 26(4):960-976. Zhou Shijie, Zhang Wenqing, Luo Jiaqing. Survey of privacy of radio frequency identification technology[J]. Journal of Software, 2015, 26(4):960-976.
[2] 李晖, 夏伟, 邓冠阳, 等. PUF-HB#:轻量级RFID双向认证协议[J]. 北京邮电大学学报, 2013, 36(6):13-17. Li Hui, Xia Wei, Deng Guanyang, et al. PUF-HB#:a lightweight RFID mutual authentication protocol[J]. Journal of Beijing University of Posts and Telecommunications, 2013, 36(6):13-17.
[3] Alomair B, Clark A, Cuellar J, et al. Scalable RFID systems:a privacy-preserving protocol with constant-time identification[J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(8):1536-1550.
[4] Chen Yalin, Chou Juesam, Sun Hungmin. A novel mutual authentication scheme based on quadratic residues for RFID systems[J]. Computer Networks, 2003, 52(12):2373-2380.
[5] Yeh T C, Wu Chienhung, Tseng Y M. Improvement of the RFID authentication scheme based on quadratic residues[J]. Computer Communications, 2011, 34(3):337-341.
[6] Chou Juesam. A constant-time identifying large-scale RFID tags using lines on a plane[J]. Transactions on emerging telecommunications technologies, 2014, 25(11):1083.
[7] Gong Li, Needham R, Yahalom R. Reasoning about belief in cryptographic protocols[C]//Proceedings of the 1990 IEEE Symposium on Research in Security and Privacy. Oakland, California:[s. n.], 1990:234-248.
[8] Sundaresan S, Doss R, Zhou Wanlei, et al. Secure ownership transfer for multi-tag multi-owner passive RFID environment with individual-owner-privacy[J]. Computer Communications, 2015, 55:112-124. |