[1]
Finkenzeller K. RFID Handbook: Fundamentals and Applications in Contactless Smart Cards, Radio Frequency Identification and Near-field Communication. 3nd Edition. London: John Wiley&Sons, (2010).
DOI: 10.1002/9780470665121
Google Scholar
[2]
Lee Y, Batina L, Singel'ee D. Low-cost Untraceable Authentication Protocols for RFID [C]/Proc of the 3rd ACM Conference on Wireless Network Security (WiSee2010). New York: Hoboken, 2010: 55-64.
DOI: 10.1145/1741866.1741877
Google Scholar
[3]
SARMA S. E, WEIS S. A, ENGLES D W. Radio frequency identification: secure risks and challenges. RSA Laboratories Crypto-bytes, 2003, 6(1): 2-9.
Google Scholar
[4]
Weis S. A, Sarma S. E, Rivest R. L, Engel D.W. Security and privacy aspect of low-cost radio frequency identification systems. In: Hutter D, Muller G, Stephan W, Ullmann M. eds. Proceedings of the 1st International Conference on security in pervasive Computing. Lectures Notes in Computer on security in pervasive Computing. Lectures Notes in Computer Science 2002. Berlin: Springer-Verlag, 2004: 201-212.
DOI: 10.1007/978-3-540-39881-3_18
Google Scholar
[5]
Ohkubo M, Suzuki K, Kinoshita S. Hash-chain based forward-secure privacy protection scheme for low-cost RFID. In: Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004), Sendai, 2004: 719-72.
Google Scholar
[6]
Henrici D, Muller P. Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers. In: Proceedings of the 2nd IEEE Annual conference on Pervasive Computing and Communications Workshops(PERCOMW'04), Washington, DC, USA, 2004: 149-153.
DOI: 10.1109/percomw.2004.1276922
Google Scholar
[7]
Mike Burmester TRI VAN LE et al. Universally Composable RFID Identification and Authentication Protocols [J]. ACM transactions on information and system security, 2009, 12_33.
DOI: 10.1145/1513601.1513603
Google Scholar