1. Want R. An introduction to RFID technology. IEEE Pervasive Computing, 2006, 5(1): 25-33
2. Weinstein R. RFID: a technical overview and its application to the enterprise. IT Professional, 2005, 7(3): 27-33
3. Spiekermann S, Evdokimov S. Critical RFID privacy-enhancing technologies. IEEE Security & Privacy, 2009, 7(2): 56-62
4. Paise R I, Vaudenay S. Mutual authentication in RFID: security and privacy. Proceedings of the 2008 ACM Symposium on Information, Computer and Communications Security (ASIACCS’08), Mar 18-20, 2008, Tokyo, Japan. New York, NY, USA: ACM, 2008: 292-299
5. Peris-Lopez P, Hernandez-Castro J C, Estevez-Tapiador J M, et al. RFID systems: a survey on security threats and proposed solutions. Processing of the IFIP 11th International Conference on Personal Wireless Communications (PWC’06), Sept 20-22, 2006, Albacete, Spain. LNCS 4217. Berlin, Germany: Springer-Verlag, 2006: 159-170
6. Phan R C W, Wu J, Ouafi K, et al. Privacy analysis of forward and backward untraceable RFID authentication schemes. Wireless Personal Communications: An International Journal, 2011, 61(1): 69-81
7. Yu Y C, Hou T W, Chiang T C. Low cost RFID real lightweight binding proof protocol for medication errors and patient safety. Journal of Medical Systems, 2012, 36(2): 823-828
8. Kapoor G, Zhou W, Piramuthu S. Multi-tag and multi-owner RFID ownership transfer in supply chains. Decision Support Systems, 2011, 52(1): 258-270
9. Chen T H, Shih W K. A robust mutual authentication protocol for wireless sensor networks. ETRI Journal, 2010, 32(5): 704-712
10. Pham T A, Hasan M S, Yu H N. A RFID mutual authentication protocol based on AES algorithm. Proceedings of the 2012 UKACC International Conference on Control. Sept 3-5, 2012, Cardiff, UK. Piscataway, NJ,USA: IEEE, 2012: 997-1002
11. Lee K. A two-step mutual authentication protocol based on randomized Hash-lock for small RFID networks. Proceedings of the 4th International Conference on Network and System Security (NSS’10), Sept 1-3, 2010, Melbourne, Australia. Piscataway, NJ, USA: IEEE, 2010: 527-533
12. Weis S A, Sarma S E, Rivest R L, et al. Security and privacy aspects of low-cost radio frequency identification systems. Proceedings of the 1st International Conference on Security in Pervasive Computing (SPC’03), Mar 12-14, 2003, Boppard, Germany. LNCS 2802. Berlin, Germany: Springer-Verlag, 2004: 201-212
13. Syamsuddin I, Dillon T, Chang E, et al. A survey of RFID authentication protocols based on Hash-chain method. Proceedings of the 3rd International Conference on Convergence and Hybrid Information Technology (ICCIT’08): Vol 2, Nov 11-13, 2008, Busan, Republic of Korea. Piscataway, NJ, USA: IEEE, 2008: 559-564
14. Song B, Mitchell C J. RFID authentication protocol for low-cost tags. Proceedings of the 1st ACM Conference on Wireless Network Security (WiSec’08), Mar 31-Apr 2, 2008, Alexandria, VA, USA. New York, NY, USA: ACM, 2008: 140-147
15. Cho J S, Yeo S S, Kim S K. Securing against brute-force attack: a Hash-based RFID mutual authentication protocol using a secret value. Computer Communications, 2011, 34(3): 391-397
16. Lee C F, Chien H Y, Laih C S. Server-less RFID authentication and searching protocol with enhanced security. International Journal of Communication Systems, 2012, 25(3): 376-385
17. Yeh T C, Wu C H, Tseng Y M. Improvement of the RFID authentication scheme based on quadratic residues. Computer Communications, 2011, 34(3): 337-341
18. Guo C, Zhang Z J, Zhu L H, et al. A novel secure group RFID authentication protocol. The Journal of China Universities of Posts and Telecommunications, 2014, 21(1): 94-103
19. Batina L, Lee Y K, Seys S, et al. Extending ECC-based RFID authentication protocols to privacy-preserving multi-party grouping proofs. Personal and Ubiquitous Computing, 2012, 16(3): 323-335
20. Chien H Y, Yang C C, Wu T C, et al. Two RFID-based solutions to enhance inpatient medication safety. Journal of Medical Systems, 2011, 35(3): 369-375
21. Ren K, Lou W, Kim K, et al. A novel privacy preserving authentication and access control scheme for pervasive computing environments. IEEE Transactions on Vehicular Technology, 2006, 55(4): 1373-1384
22. Habibi M H, Gardeshi M, Alaghband M R. Practical attacks on a RFID authentication protocol conforming to EPC C-1 G-2 standard. International Journal of Ubicomp, 2011, 2(1): 1-13
23. Juels A, Weis S A. Defining strong privacy for RFID. ACM Transactions on Information and System Security, 2009, 13(1): 1-23
24. Avoine G, Oechslin P. RFID traceability: a multilayer problem. Financial Cryptography and Data Security: Proceedings of the 9th International Conference on Financial Cryptography (FC’05), Feb 28-Mar 3, 2005, Roseau, The Commonwealth of Dominica. LNCS 3570. Berlin, Germany: Springer-Verlag, 2005: 125-140
25. Lu L, Liu Y H, Li X Y. Refresh: weak privacy model for RFID systems. Proceedings of the 29th Annual Joint Conference of the IEEE Computer and Communications (INFOCOM’10), Mar 14-19, 2010, San Diego, CA, USA. Piscataway, NJ, USA: IEEE, 2010: 9p |