[1] Juels A. RFID security and privacy: a research survey[J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2): 381-394. [2] Le T V, Burmester M, Medeiros B. Universally composable and forward secure RFID authentication and authenticated key exchange//ASIACCS07. New York: ACM Press, 2007: 242-252. [3] Cao T J, Bertino E. Security analysis of the SASI protocol[J]. IEEE Transactions on Dependable and Secure Computing, 2009, 6(1): 73-77. [4] Song B, Mitchell J C. RFID authentication protocol for low-cost tags//WiSec08. New York: ACM Press, 2008: 140-147. [5] Chien H Y, Huang C W. Security of ultra-lightweight RFID authentication protocols and its improvements[J]. ACM Operating System Review, 2007, 41(2): 83-86. [6] Thayer F, Herzog J C, Guttman J D. Strand spaces: proving security protocols correct[J]. Journal of Computer Security, 1999, 7(2): 191-230. [7] 龙士工, 罗文俊, 袁超伟, 等. 串空间模型中的口令猜测攻击[J]. 北京邮电大学学报, 2007, 30(1): 62-65. Long Shigong, Luo Wenjun, Yuan Chaowei, et al. The guess attacks in the strand space model[J]. Journal of Beijing University of Posts and Telecommunications, 2007, 30(1): 62-65. [8] Garcia F D, Hasuo I, Pieters W, et al. Provable anonymity//FMSE. Virginia: IEEE Press, 2005: 63-72. [9] Feldhofer M, Dominikus S, Wolkerstorfer J. Strong authentication for RFID systems using the AES algorithm//CHES04. Berlin: Springer-Verlag, 2004: 357-370. [10] Ouafi K, Phan R. Traceable privacy of recent provably-secure RFID protocols//ACNS08. New York: ACM Press, 2008: 479-489. |