[1] Pappu R, Pappu R, Parno B. Unidirectional key distribution across time and space with applications to RFID security[C]//Conference on Security Symposium.[S.l.]:USENIX Association, 2008:75-90.
[2] 鲁力. RFID系统密钥无线生成[J]. 计算机学报, 2015, 38(4):822-832. Lu Li. Wireless key generation for RFID systems[J]. Chinese Journal of Computers, 2015, 38(4):822-832.
[3] 丁振华, 李锦涛, 冯波. 基于Hash函数的RFID安全认证协议研究[J]. 计算机研究与发展, 2009, 46(4):583-592. Ding Zhenhua, Li Jintao, Feng Bo. Research on Hash-based RFID security authentication protocol[J]. Journal of Computer Research and Development, 2009, 46(4):583-592.
[4] Ghosh P, Mahesh T R. A privacy preserving mutual authentication protocol for RFID based automated toll collection system[C]//International Conference on ICT in Business Industry and Government.[S.l.]:IEEE, 2017:1-5.
[5] Wu Xiaoqin, Zhang Min, Yang Xiaolong. Time-stamp based mutual authentication protocol for mobile RFID system[C]//Wireless and Optical Communication Conference.[S.l.]:IEEE, 2013:702-706.
[6] Wang Zhao, Zhang Xuesong, Chen Zhong. Rapdos:a RFID authentication protocol for defending against DoS[C]//International Conference on Computational and Information Sciences.[S.l.]:IEEE, 2012:1042-1045.
[7] 张忠, 徐秋亮. 物联网环境下UC安全的组证明RFID协议[J]. 计算机学报, 2011, 34(7):1188-1194. Zhang Zhong, Xu Qiuliang. Universal composable grouping-proof protocol for RFID tags in the internet of things[J]. Chinese Journal of Computers, 2011, 34(7):1188-1194.
[8] Zhong Hong, Wen Jingyu, Cui Jie, et al. Efficient conditional privacy-preserving and authentication scheme for secure service provision in VANET[J]. Tsinghua Science and Technology, 2016, 21(6):620-629.
[9] Burrows M, Abadi M M, Needham R M. A logic of authentication[J]. ACM Transactions on Computer Systems, 1990(8):18-36.
[10] Dimitriou T. rfidDOT:RFID delegation and ownership transfer made simple[C]//International Conference on Security and Privacy in Communication Netowrks.[S.l.]:ACM, 2008:1-8.
[11] Song B, Mitchell C J. RFID authentication protocol for low-cost tags[C]//ACM Conference on Wireless Network Security, WISEC 2008. Alexandria:[s.n.], 2008:140-147.
[12] Deursen T V, Radomirovic S. Untraceable RFID protocols are not trivially composable:attacks on the revision of EC-RAC[J]. Iacr Cryptology Eprint Archive, 2009:332.
[13] Liu Fen, Hu Lei. ROAD:a RFID offline authentication, privacy preserving protocol with DoS resilience[C]//Ifip International Conference on Network and Parallel Computing.[S.l.]:IEEE, 2008:139-146. |