[1]
Juels, A. RFID security and privacy: a research survey [J]. IEEE Journal on Selected Areas in Communications, 2006, 24(2): 381-394.
DOI: 10.1109/jsac.2005.861395
Google Scholar
[2]
To quell the RFID safety crisis: American standard Arise [N]. Printing Quality & Standardization, 2007, 7: 10-10.
Google Scholar
[3]
Patrick Tague, David Slater, Jason Rogers, and Radha Poovendran. Vulnerability of Network Traffic under Node Capture Attacks using Circuit Theoretic Analysis [A]. The 27th IEEE Conference on Computer Communications (INFOCOM 2008) [C]. Phoniex, AZ, U.S. A, IEEE Communications Society, Apr. 13-18, 2008: 161-165.
DOI: 10.1109/infocom.2008.41
Google Scholar
[4]
Mauro Conti, Roberto Di Pietro, Luigi V. Mancini and Alessandro Mei. Mobility and Cooperation to Thwart Node Capture Attacks in MANETs [J]. EURASIP Journal on Wireless Communications and Networking, Volume 2009 (2009).
DOI: 10.1155/2009/945943
Google Scholar
[5]
R. L. Rivest, L. M. Adleman, and M. L. Dertouzos. On databanks and privacy homomorphisms [J]. Foundations of Secure Computation, 1978: 169-180.
Google Scholar
[6]
S. Goldwasser and S. Micali. Probabilistic encryption [J]. Journal of Computer and System Sciences, 1984, 28(2): 270–299.
DOI: 10.1016/0022-0000(84)90070-9
Google Scholar
[7]
J. Domingo-Ferrer. A new privacy homomorphism and applications [J]. Information Processing Letters, 2006, 60(5): 277-282.
DOI: 10.1016/s0020-0190(96)00170-6
Google Scholar
[8]
J. Domingo-Ferrer. A provably secure additive and multiplicative privacy homomorphism [A]. In Proceedings of the 5th International Conference on Information Security (ISC 2002) [C]. Springer-Verlag, 2002: 471-483.
DOI: 10.1007/3-540-45811-5_37
Google Scholar
[9]
J. H. Cheon and H. S. Nam. A cryptanalysis of the original domingo-ferrer's algebraic privacy homomophism [R]. Cryptology ePrint Archive, Report 2003/221, (2003).
Google Scholar
[10]
F. Bao. Cryptanalysis of a provable secure additive and multiplicative privacy homomorphism [A]. In Proceedings of the International Workshop on Coding and Cryptography (WCC 2005) [C]. 2005: 43-50.
Google Scholar
[11]
D. Wagner. Cryptanalysis of an algebraic privacy homomorphism [A]. In Proceedings of the 5th International Conference on Information Security (ISC 2003) [C]. Springer-Verlag, 2003: 234–239.
DOI: 10.1007/10958513_18
Google Scholar
[12]
N. Ahituv, Y. Lapid, and S. Neumann. Processing encrypted data [J]. Communications of the ACM, 1987, 30(9): 777–780.
DOI: 10.1145/30401.30404
Google Scholar
[13]
Steven. A Novel Information Hiding Technique for Security by Using Image Steganography. Journal of Theoretical and Applied Information Technology on October 24, (2009).
Google Scholar