Computer Science ›› 2014, Vol. 41 ›› Issue (12): 125-128.doi: 10.11896/j.issn.1002-137X.2014.12.026
Previous Articles Next Articles
SHEN Jin-wei and LING Jie
[1] 邵婧,陈越,常振华.RFID标签所有权转换模式及协议设计[J].计算机工程,2009,35(15):143-145 [2] Molnar D,Soppera A,Wagner D.A Scalable,Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags[C]∥Proc.of SAC’05.Kingston,Jamaica:Springer-Verlag,2005:276-290 [3] Osaka K,Takagi T,Yamazaki K,et al.An Efficient and Secure RFID Security Method with Ownership Transfer[C]∥Proc.of CIS’06.Springer-Verlag,2006:778-787 [4] Fouladgar S,Afifi H.An Efficient Delegation and Transfer of Ownership Protocol for RFID Tags[C]∥Proc.of the 1st International Workshop on RFID Technology.Vienna,Austria,2007 [5] Kulseng L,Yu Zhen,Wei Ya-wen,et al.Lightweight mutual authentication and ownership transfer for RFID systems [C]∥Proc of the 29th Conf on Computer Communications IEEE INFOCOM 2010.Piscataway,NJ:IEEE,2010:1-5 [6] 金永明,孙惠平,关志,等.RFID标签所有权转移协议研究[J].计算机研究与发展,2011,48(8):1400-1405 [7] Fernandez-Mir A,Trujillo-Rasua R,Castella-Roca J,et al.AScalable RFID Authentication Protocol Supporting Ownership Transfer and Controlled Delegation.RFID,Security and Privacy,LNCS,2012,7055:147-162 [8] Doss R,Zhou Wan-lei,Yu Shui.Secure RFID Tag Ownership Transfer Based on Quadratic Residues[J].IEEE Transcations on information forensics and security,2013,8(2):390-401 [9] 彭朋,赵一鸣,韩伟力,等.一种超轻量级的RFID双向认证协议[J].计算机工程,2011,37(16):140-142 [10] Shamir A.SQUASH-A new MAC with provable security properties for constrained devices such as RFID tags [C]∥LNCS 5086:Proc of 15th Annual Fast Software Encryption Workshop.Springer,2008:144-157 [11] 李杰.RFID安全认证协议研究与设计[D].西安:西安电子科技大学,2012:40-46 |
No related articles found! |
|