[1]
Shen J, Wang J, Mei Y, et al. Privacy Models for RFID Authentication Protocols[J]. 2013. pp.391-397.
Google Scholar
[2]
JUELS A, RIVEST R, SZYDLO M. The blocker tag: Selective blocking of RFID tags for consumer privacy[C]/Proceeding of the 8th ACM Conference on Computer and Communication Security. New York: ACM, 2003: 103-111.
DOI: 10.1145/948109.948126
Google Scholar
[3]
PEDRO P L, JULIO C H C, JUAN M, et al. RFID system: A survey on security threats and proposed solutions[J]. Lecture Notes in Computer Science, 2006, 42(17): 159-170.
Google Scholar
[4]
A. Juels and R. Pappu, Squealing euros: Privacy protection in RFID-enabled banknotes. In proceedings of Financial Cryptography-FC'03, (2003).
DOI: 10.1007/978-3-540-45126-6_8
Google Scholar
[5]
S. A. Weis, S. E. Sarma, S. A. Weis and D. W. Engels. Security and privacy Aspects of Low-Cost Radio Frequency Identification Systems. First International Conference on Security in Pervasive Computing, 2003. http: /theory. lcs. mit. edu/sweis/spc-rfid. pdf.
DOI: 10.1007/978-3-540-39881-3_18
Google Scholar
[6]
A. Juels, R. L. Rivest and M. Szudlo. The Blocker Tag: Selective Blocking of RFID tags for Consumer Privacy. In the 8th ACM Conference on Computer and Communications Security, pp.103-111.
DOI: 10.1145/948109.948126
Google Scholar
[7]
Lee C Y, Wu H L, Chang J C. A Dynamic Approach to Hash-Based Privacy-Preserving RFID Protocols[M] Advances in Intelligent Systems and Applications-Volume 2. Springer Berlin Heidelberg, 2013: 15-23.
DOI: 10.1007/978-3-642-35473-1_2
Google Scholar
[8]
CHEN Shao-wei, CHEN Rui, LING Li. An improved hash-based RFID two-way security authentication algorithm[J]. Computer Systems and Applications, 2010, 19(3): 67-70.
Google Scholar
[9]
SARMA S E, WEI S A, ENGLES D W. Radio-frequency identification: Security risks and challenges[J]. CryptoBytes Technical Newsletter from RSA Laboratories, 2003, 6(1): 2-9.
Google Scholar
[10]
LEE S M, HWANG Y J, LEED H, et al. Efficient authentication for low cost RFID System[C]/International Conference on Computational Science and its Applications. Singapore: World Scientific Publish Company, 2005: 619-627.
Google Scholar
[11]
HENRICI D, MAULLER P. Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers[C]/International Workshop on Pervasive Computing and Communication. Orlando, USA, 2004: 149-153.
DOI: 10.1109/percomw.2004.1276922
Google Scholar
[12]
SEIS A, SAIMA S E, RIVEST R L. Security and privacy aspects of low-cost radio frequency identification System[C]/Proceeding of the 1st International Conference on Security in Pervasive Computing. [S. l. ]: Springer, 2004: 201-212.
DOI: 10.1007/978-3-540-39881-3_18
Google Scholar
[13]
Burrows M, Abadi M, Needham R M. A Logic of authentication[J]. ACM Transactions on Computer Systems, 1989, 8(1): 233-271.
Google Scholar
[14]
Comparison of various Security Protocols in RFID. International Journal of Computer Applications (0975 – 8887), Volume 24– No. 7, June (2011).
Google Scholar
[15]
Henrici and Paul Muller. Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers. PerSec04 at IEEE PerCom, (2004).
DOI: 10.1109/percomw.2004.1276922
Google Scholar