2. Mitrokotsa A, Rieback M R, Tanenbaum A S. Classifying RFID attacks and defenses. Information Systems Frontiers, 2010, 12(5): 491-505
3. Lee Y C, Hsieh Y C, You P S, et al. An improvement on RFID authentication protocol with privacy protection. Proceedings of the 3rd International Conference of Convergence and Hybrid Information Technology (ICCIT’08): Vol 2, Nov 11-13, 2008, Busan, Republic of Korea. Washington, DC, USA: IEEE Computer Society, 2008: 569-573
4. Ding Z H, Li J T, Feng B. Research on Hash-based RFID security authentication protocol. Journal of Computer Research and Development, 2009, 46(4): 583-592 (in Chinese)
5. Luo X B. A RFID secure protocol based on dynamic ID mechanism. Master Thesis. Guangzhou, China: Sun Yat-sen University, 2010 (in Chinese)
6. Phan R C W, Wu J, Ouafi K, et al. Privacy analysis of forward and backward untraceable RFID authentication schemes. Wireless Personal Communications, 2011, 61(1): 69-81
7. Niu B, Zhu X Y, Chi H T, et al. Privacy and authentication protocol for mobile RFID systems. Wireless Personal Communications, 2014, 77(3): 1713-1731
8. Monzur M, Anthony A. An efficient and secure authentication protocol for RFID systems. International Journal of Automation & Computing, 2012, 9(3): 257-265
9. Zheng Z L. Research and implication of RFID security identification protocol. Master Thesis. Beijing, China: Beijing Jiaotong University, 2014 (in Chinese) |