[1] Finkenzeller K. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-field Communication [M]. 3nd Edition. London: John Wiley & Sons, 2010.
[2] Habibi M H, Gardeshi M, Alaghband M R. Practical Attacks on a RFID Authentication Protocol Conforming to EPC C-1 G-2 Standard [J]. International Journal of UbiComp(IJU), 2011, 2(1):1-13.
[3] Lee Y, Batina L, Singel'ee D. Low-cost Untraceable Authentication Protocols for RFID [C]//Proc of the 3rd ACM Conference on Wireless Network Security (WiSec2010). New York: Hoboken, 2010: 55-64.
[4] Spiekermann S, Evdokimov S. Critical RFID Privacy-enhancing Technologies [J]. IEEE Security and Privacy, 2009, 7(2): 56-62.
[5] Yauksel K. Universal Hashing for Ultra-low-power Cryptographic Hardware Applications [D]. Worcaster: Department of Electroninal Engineering, Worcester Polytechnic Institute, 2004.
[6] Duc D, Park J, Lee H, et al. Enhancing Security of EPCglobal Gen-2 RFID Tag against Traceability and Cloning [C]//Proc of The 2006 Symposiumon on Cryptography and Information Security. Hiroshima: Institute of Electronics, Information and Communication Engineers, 2006: 17-20.
[7] Chien H, Chen C. Mutual Authentication Protocol for RFID Conforming to EPC Class1 Generation 2 Standards [J]. Computer Standards& Interfaces, 2007, 29(2): 254-259.
[8] Lim C, Kwon T. Strong and Robust RFID Authentication Enabling Perfect Ownership Transfer [C]//Proc of International Conference on Information and Communications Security. Berlin: Springer-Verlag, LNCS 4307, 2006: 1-20.
[9] Cho J S, Yeo S S, Kim S K. Securing against Brute-force Attack: a hash-based RFID Mutual Authentication Protocol Using a Secret Value [J]. Computer Communications, 2011, 34(3): 391-397.
[10] Phan R C W, Wu J, Ouafi K, et al. Privacy Analysis of Forward and Backward Untraceable RFID Authentication Schemes [J]. Wireless Personal Communications, 2010, 53(2): 1-13.
[11] 邱钢, 王宏, 肖鸿, 等. 两个前向安全盲签名体制的安全性分析 [J]. 西安电子科技大学学报, 2010, 37(1): 107-112.
Qiu Gang, Wang Hong, Xiao Hong, et al. Security Analysis of Two Forward Secure Blind Signature Schemes [J]. Journal of Xidian University, 2010, 37(1): 107-112.
[12] Song B, Chris J. RFID Authentication Protocol for Low-cost Tags [C]//Proc of The ACM Conference on Wireless Network Security (WISEC'08). New York: ACM, 2008: 140-147. |