[1]
K. Finkenzeller, RFID handbook: fundamentals and applications in contactless smart cards and identification, John Wiley & Sons, Inc., (2003).
DOI: 10.1145/1005062.1005077
Google Scholar
[2]
S.E. Sarma, S.A. Weis, D.W. Engels, RFID systems and security and privacy implications. Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems(CHES 2002). Lectures Notes in Computer Science 2523. Springer-Verlag, Berlin. (2003).
DOI: 10.1007/3-540-36400-5_33
Google Scholar
[3]
S.E. Sarma, S.A. Weis, D.W. Engels, Radio frequency identification: Secure risks and challenges, RSA Laboratories Cryptobytes. 6 (2003) 2-9.
Google Scholar
[4]
M. Ohkubo, K. Suzuki, S. Kinoshita, Hash-chain based forward secure privacy protection scheme for low-cost RFID, Proceedings of the 2004 Symposium on Cryptography and Information Security (SCIS 2004), Sendai. (2004) 719-724.
Google Scholar
[5]
K. Rhee, J. Kwak, S. Kim, Challenge-response based RFID authentication protocol for distributed database environment. Proceedings of the 2nd International Conference on Security in Pervasive Computing (SPC 2005). Lectures Notes in Computer Science 3450, Springer-Verlag, Berlin. (2005).
DOI: 10.1007/978-3-540-32004-3_9
Google Scholar
[6]
G. Lin, Y. Wang, Y. Zhan, RFID Secure Protocol Based on Random Sequence, Computer Engineering, 20 (2008) 151-153.
Google Scholar
[7]
Z. Ding, L. Guo, Y. Wang, An authentication protocol based on key array for RFID, Journal of Electronics & Information Technology. 31 (2009) 722-726.
Google Scholar
[8]
S. Yuan, H. Dai, S. Lai, Hash-based RFID Authentication Protocol, Computer Engineering. 34 (2008) 141-143.
Google Scholar