[1]
S. E. Sarma, S. A. Weis, and D. W. Engels, RFID systems and security and privacy implications, Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems. Lectures Notes in Computer Science, vol. 2523, 2003, pp.454-469.
DOI: 10.1007/3-540-36400-5_33
Google Scholar
[2]
S. A. Weis , S. E. Sarma , R. L. Rivest , D. W. Engels. Security and privacy aspects of low-cost radio frequency identification systems, Proceedings of the 1st International Conference on Security in Pervasive Computing. Lectures Notes in Computer Science, vol. 2802 , pp.201-212.
DOI: 10.1007/978-3-540-39881-3_18
Google Scholar
[3]
Miyako Ohkubo, Koutarou Suzuki and Shingo Kinoshita, Cryptographic Approach to a Privacy Friendly Tag, RFID Privacy Workshop@MIT, (2003).
Google Scholar
[4]
N. J. Hopper, M. Blum, Secure human identification protocols, Advances in Cryptology - ASIACRYPT. Lecture Notes in Computer Science, vol. 2248, 2001, pp.52-66.
DOI: 10.1007/3-540-45682-1_4
Google Scholar
[5]
A. Juels, S. A. Weis. Authenticating pervasive devices with human protocols, Advances in Cryptology - CRYPTO 2005: 25th Annual International Cryptology Conference, 2005, pp.294-319, (2005).
DOI: 10.1007/11535218_18
Google Scholar
[6]
H. Gilbert, M. Robshaw, H. Sibert, An active attack against HB+ - a provably secure lightweight protocol, Cryptology ePrint Archive, Report 2005/237, 2005. http: /eprint. iacr. org.
DOI: 10.1049/el:20052622
Google Scholar
[7]
J. Bringer, H. Chabanne, and E. Dottax, HB ++: A lightweight authentication protocol secure against some attacks, Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2006, pp.28-33.
DOI: 10.1109/secperu.2006.10
Google Scholar
[8]
Selwyn Piramuthu, HB and Related Lightweight Authentication Protocols for Secure RFID Tag-Reader Authentication, Collaborative Electronic Commerce Technology and Research. Basel, (2006).
Google Scholar
[9]
Yong-Zhen Li, Young-Bok Cho, Nam-Kyoung Um, Sang-Ho Lee, Security and Privacy on Authentication Protocol for Low-cost RFID, International Conference on Computational Intelligence and Security, vol2, 2006, pp.1101-1104.
DOI: 10.1109/iccias.2006.295432
Google Scholar
[10]
Hung-Yu Chien, Chen-Wei Huang, A Lightweight RFID Protocol Using Substring , Lecture Notes in Computer Science, vol 4808, 2007, pp.422-431.
DOI: 10.1007/978-3-540-77092-3_37
Google Scholar
[11]
Chiu C. Tan, Bo Sheng, Qun Li, Serverless Search and Authentication Protocols for RFID, Proceedings of International Conference on Pervasive Computing and Communications, 2007, pp.3-12.
DOI: 10.1109/percom.2007.30
Google Scholar