Computer Science ›› 2016, Vol. 43 ›› Issue (8): 128-130.doi: 10.11896/j.issn.1002-137X.2016.08.027
Previous Articles Next Articles
LIU Dao-wei, LING Jie and YANG Xin
[1] Ding Zhen-hua,Li Jin-tao,Feng Bo.Research on hash-basedRFID security authentication protocol [J].Journal of computer Research and Development,2009,46(4):583-592(in Chinese) 丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,6(4):583-592 [2] Ma Chang-she.Low cost RFID authentication protocol with forward privacy [J].Chinese Journal of Comptuers,2011,34(8):1388-1398(in Chinese) 马昌社.前向隐私安全的低成本RFID认证协议[J].计算机学报,2011,4(8):1388-1398 [3] International Telecommunication Union.ITU Internet Reports 2005:The Internet of Things [R].Geneva:ITU,2005 [4] Zhou Yong-bin,Feng Deng-guo.Design and analysis of cryptographic protocols RFID[J].Chinese Journal of Computers,2006,29(4):581-590(in Chinese) 周永彬,冯登国.RFID安全协议的设计与分析[J].计算机学报,2006,9(4):581-589 [5] Jin Yong-ming,Wu Qi-ying,Shi Zhi-qiang,et al.RFID Lightweight Authentication Protocol Based on PRF [J].Journal of Computer Research and Development,2014,1(7):1506-1514(in Chinese) 金永明,吴棋滢,石志强等.基于PRF的RFID轻量级认证协议研究[J].计算机研究与发展,2014,1(7):1506-1514 [6] Ohkubo M,Suzuki K,Kinoshta S.Hash-chain based for-ward-secure privacy protection scheme for low-cost RFID[C]∥Proceedings of the 2004 Symposium on Cryptography and Information Security.Berlin:Springer-Verlag,2004:719-724 [7] Miyaji A,Rahman M S.KIMAP:Key-insulated mutual authentication protocol for RFID [J].Int Journal of Automated Identification Technology,2011,3(2):61-74 [8] Alomair B,Cuellar J,Poovendran R.Scalable RFID systems:A privacy-preserving protocol with constant time identification [J].IEEE Trans on Parallel and Distributed Systems,2012,3(8):1-10 [9] Godor G,Imre S.Hash-based mutual authentication protocol for low-cost RFID systems[C]∥Proc of the 18thEUNICE Conf on Information and Communications Technologies.Berlin:Sprin-ger,2012:76-87 [10] Mamun M S I,Miyaji A,Rahman M S.A secure and private RFID authentication protocol under SLPN problem[C]∥Proc of the 6thInt Conf on Network and System Security.Berlin:Sprin-ger,2012:476-489 [11] Wang Shao-hui,Liu Su-juan,Chen Dan-wei.Scalable RFID Mutual Authentication Protocol with Backward Privacy [J].Journal of computer Research and Development,2013,0(6):1276-1284(in Chinese) 王少辉,刘素娟,陈丹伟.满足后向隐私的可扩展RFID双向认证方案[J].计算机研究与发展,2013,0(6):1276-1284 [12] Shamir A.SQUASH-A new MAC with provable security pro-perties for highly constrained devices such as RFID tags [C]∥Proc of Fast Software Encryption.Berlin:Springer,2008:144-157 [13] Gosset F,Standaert F X,Quisquater J J.FPGA implementation of SQUASH[C]∥Proc of the 29th Sysp on Information Theory in the Benelux.Leuven:Werkgemeenschap Informatie,2008:1-8 |
No related articles found! |
|