[1]
ZHOU Yong-Bin FENG Deng-Guo Design and Analysis of Cryptographic Protocols for RFID. [J] CHINESE JOURNAL OF COMPUTERS , 2006, (04).
Google Scholar
[2]
RIEBACKMR, CRISPO B, TANENBAUM AS. The evolution of RFID security [J]. IEEE Pervasive Computing, 2006, 5 (1) : 62 -69.
DOI: 10.1109/mprv.2006.17
Google Scholar
[3]
Weis S.A. , Sarma S. E. , Rivest R.L. , Engels D. W. . Security and privacy aspects of low-cost radio frequency identification systems. In: Hutter D. , Müller G. , Stephan W. , Ullmann M. eds. . Proceedings of the 1st International Conference on Security in Pervasive Computing. Lectures Notes in Computer Science 2802. Berlin: Springer-Verlag , 2004 , 201~212.
DOI: 10.1007/978-3-540-39881-3_18
Google Scholar
[4]
SU Wei, CUI Zhe, WANG Xiao-jing, Research on Hash chain-based RFID privacy enhancement tag [J], Computer Applications , 2006, (10).
Google Scholar
[5]
Frank Thornton,Syngress RFID Security(2006)[M]Canada :Syngress Publishing, (2006).
DOI: 10.1016/b978-159749056-6/50021-6
Google Scholar
[6]
Sarma S. E. , Weis S. A. , Engels D. W. . Radio-frequency identification: Secure risks and challenges. RSA Laboratories Cryptobytes , 2003 , 6(1) : 2~9.
Google Scholar
[7]
Sarma S. E. , Weis S. A. , Engels D. W. . RFID systems and security and privacy implications. In: Kaliski B. S. , Koc C.K. , Paar C. eds. . Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems(CHES2002 ). Lectures Notesin Computer Science 2523. Berlin: Springer-Verlag, 2003 , 454~469.
DOI: 10.1007/3-540-36400-5_33
Google Scholar
[8]
C. Castelluccia and G. Avoine, Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags, Proceedings of CARDIS 2006, LNCS 3928, 289-299, (2006).
DOI: 10.1007/11733447_21
Google Scholar
[9]
Rhee K. , Kwak J. , Kim S. , Won D. . Challenge response based RFID authentication protocol for distributed database environment. In: Hutter D. , Ullmann M. eds. . Proceedings of the 2nd International Conference on Security in Pervasive Com putting( SPC 2005 ). Lectures Notes in Computer Science 3450. Berlin: Springer2Verlag, 2005 , 70~84.
DOI: 10.1007/978-3-540-32004-3_9
Google Scholar
[10]
FinkenzelleK. RFID-Handbook, Fundamentals and Applications in Contactlcss Smart Cards and Identification(2nd Edition) . New York: Wiley and Sons。, (2003).
Google Scholar
[6]
Sarma S. E. , Weis S. A. , Engels D. W. . Radio-frequency identification: Secure risks and challenges. RSA Laboratories Cryptobytes , 2003 , 6(1) : 2~9.
Google Scholar
[7]
Sarma S. E. , Weis S. A. , Engels D. W. . RFID systems and security and privacy implications. In: Kaliski B. S. , Koc C.K. , Paar C. eds. . Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems(CHES2002 ). Lectures Notesin Computer Science 2523. Berlin: Springer-Verlag, 2003 , 454~469.
DOI: 10.1007/3-540-36400-5_33
Google Scholar
[8]
C. Castelluccia and G. Avoine, Noisy Tags: A Pretty Good Key Exchange Protocol for RFID Tags, Proceedings of CARDIS 2006, LNCS 3928, 289-299, (2006).
DOI: 10.1007/11733447_21
Google Scholar
[9]
Rhee K. , Kwak J. , Kim S. , Won D. . Challenge response based RFID authentication protocol for distributed database environment. In: Hutter D. , Ullmann M. eds. . Proceedings of the 2nd International Conference on Security in Pervasive Com putting( SPC 2005 ). Lectures Notes in Computer Science 3450. Berlin: Springer2Verlag, 2005 , 70~84.
DOI: 10.1007/978-3-540-32004-3_9
Google Scholar
[10]
FinkenzelleK. RFID-Handbook, Fundamentals and Applications in Contactlcss Smart Cards and Identification(2nd Edition) . New York: Wiley and Sons。, (2003).
Google Scholar