1. Gao Z, Hu X D. Research on integration of RFID warehouse information system based on CORBA. Journal of Chongqing University of Posts and Telecommunications: Natural Science Edition, 2010, 22(4): 464-467(in Chinese)
2. Peris-Lopez P, Castro J C H, Tapiador J M E, et al. Cryptanalysis of a novel authentication protocol conforming to EPC-C1G2 standard. Computer Standards and Interfaces, 2009, 31(2): 372-380
3. Karthikeyan S, Nesterenko M. RFID security without extensive cryptography. Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks (SASN’05), Nov 7, 2005, Alexandria, VA, USA. New York, NY, USA: ACM, 2005: 63-67
4. Cai S, Li Y, Li T. Attacks and improvements to an RFID mutual authentication protocol. Proceedings of the 2nd ACM Conference on Wireless Network Security (WiSec’05), Mar 16-18, 2009, Zurich, Switzerland. New York, NY, USA: ACM, 2009: 51-58
5. Chien H Y, Chen C H. Mutual authentication protocol for RFID conforming to EPC class 1 generation 2 standards. Computer Standards and Interfaces, 2007, 29(2), 254-259
6. Chen C L, Deng Y Y. Conformation of EPC class 1 generation 2 standards RFID system with mutual authentication and privacy protection. Engineering Applications of Artificial Intelligence, 2009, 22 (8): 1284-1291
7. Peris-Lopez P, Hernandez-Castro J C H, Tapiador J M E, et al. Cryptanalysis of an EPC class-1 generation-2 standard compliant authentication protocol. Engineering Applications of Artificial Intelligence, 2011, 24(6): 1061-1069
8. Yeh T C, Wang Y J, Kuo T C, et al. Securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Systems with Applications, 2011, 37(12): 7678-7683
9. Yoon E J. Improvement of the securing RFID systems conforming to EPC class 1 generation 2 standard. Expert Systems with Applications, 2012, 39(1): 1589-1594
10. Han S, Potgar V, Chang E. Mutual authentication protocol for RFID tags based on synchronized secret information with monitor. Proceedings of the 2007 International Conference on Computational Science and its Applications (ICCSA’07), Aug 26-29, 2007, Kuala Lumpur, Malaysia. Los Alamitos, CA, USA: IEEE Computer Society, 2007: 227-238
11. Ha J C, Ha J H, Moon S J, et al. LRMAP: lightweight and resynchronous mutual authentication protocol for RFID system. Ubiquitous Convergence Technology: First International Conference (ICUCT’06), Dec 5-6, 2006, Jeju Island, Republic of Korea. LNCS 4412. Berlin, Germany: Springer-Verlag, 2007: 80-89
12. Tan C C, Sheng B, Li Q. Secure and serverless RFID authentication and search protocols. IEEE Transactions on Wireless Communications 2008, 7 (4): 1400-1407
13. Piramuthu S. RFID mutual authentication protocols. Decision Support Systems, 2011, 50(2): 387-393
14. Peris-Lopez P, Castro J C H, Tapiador J M E, et al. Vulnerability analysis of RFID protocols for tag ownership transfer. Computer Network, 2010, 54(9): 1502-1508
15. Wang H G, Pei C X, Zheng F. Performance analysis and test for passive RFID system at UHF band. The Journal of China Universities of Posts and Telecommunications, 2009, 16(6): 49-56
16. Canetti R. Universally composable security: a new paradigm for cryptographic protocols. Proceedings of the 42nd IEEE Symposium of on Foundations of Computer Science (FOCS’01), Oct 14-17, 2001, Las Vegas, NV, USA. Los Alamitos, CA, USA: Computer Society, 2001: 136-145
17. Canetti R. Universally composable signature, certification, and authentication. Proceedings of the 17th Compuetr Security Foundations Workshop (CSFW’04), Jun 28-30, 2004, Pacific Grove, CA, USA. Piscataway, NJ, USA: IEEE, 2004: 219-233
18. Goldreich O, Goldwasser S, Micali S. How to construct random functions. Journal of the Association for Computing Machinery, 1986, 33(4): 792-807
19. Weis S A. Security and privacy in radio-frequency identification devices. Masters Thesis. Cambridge, MA, USA: MIT, 2003
|