Computer Science ›› 2013, Vol. 40 ›› Issue (12): 141-146.
Previous Articles Next Articles
LIU Ya-li,QIN Xiao-lin and WANG Chao
[1] Juels A.RFID Security and Privacy:A Research Survey [J].IEEE Journal on Selected Areas in Communications,2006,24(2):381-394 [2] Juels A.Strengthening EPC Tag against Cloning [C]∥Procee-dings of the 4th ACM Workshop on Wireless Security.ACM,2005:67-76 [3] Liu Ya-li,Qin Xiao-lin,Li Bo-han,et al.A Forward-SecureGrouping-proof Protocol for Multiple RFID tags [J].International Journal of Computational Intelligence Systems,2012,5(5):824-833 [4] Chien H Y,Chen C H.Mutual Authentication Protocol forRFID Conforming to EPC Class-1Generation-2Standards [J].Computer Standards and Interfaces,2007,29(2):254-259 [5] Rotter P.A Framework for Assessing RFID System Securityand Privacy Risks [J].IEEE Pervasive Computing,2008,7(2):70-77 [6] Zuo Y.Survivable RFID Systems:Issues,Challenges,and Techniques [J].IEEE Transactions on Systems,Man,and Cyberne-tics-Part C:Applications and Reviews,2010,40(4):406-418 [7] Chien H Y.SASI:A New Ultralightweight RFID Authentica-tion Protocol Providing Strong Authentication and Strong Integrity [J].IEEE Transactions on Dependable and Secure Computing,2007,4(4):337-340 [8] Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.LMAP:A Real Lightweight Mutual Authentication Protocol for Low-Cost RFID Tags [C]∥Proc.Second Workshop RFID Security.Graz,Austria,2006:12-14 [9] Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.EMAP:An Efficient Mutual Authentication Protocol for Low-Cost RFID Tags [C]∥Proc.OTM Federated Conf.and Workshop:IS Workshop (IS’06).LNCS 4277,Springer-Verlag,Berlin Heidelberg,2006:352-361 [10] Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.M2AP:A Minimalist Mutual-Authentication Protocol for Low-Cost RFID Tags [C]∥Proc.Int’l Conf.Ubiquitous Intelligence and Computing (UIC’06).LNCS 4159,2006:912-923 [11] Lo N W,Shie H S,Yeh K H.A Design of RFID Mutual Authentication Protocol Using Lightweight Bitwise Operations [C]∥Proc.the 3rd Joint Workshop on Information Security (JWIS 2008).Seoul,Korea,2008 [12] Li Tie-yan.Employing Lightweight Primitives on Low-costRFID Tags for Authentication [C]∥Proc.Vehicular Technology Conference 2008(VTC’08).IEEE,68th,2008:1-5 [13] Burmester M,Munilla O.Lightweight RFID Authenticationwith Forward and Backward Security [J].ACM Transactions on Information and System Security (TISSEC),2011,14(1):11-37 [14] Li Tie-yan,Deng R.Vulnerability Analysis of EMAP-An Effi-cient RFID Mutual Authentication Protocol [C]∥ The Second International Conference on Availability,Reliability and Security (ARES’07).IEEE,2007:238-245 [15] Li Tie-yan,Wang Gui-lin.Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols [C]∥New Approaches for Security,Privacy and Trust in Complex Environments.Springer US,2007,232:109-120 [16] Chien H Y,Huang C W.Security of Ultra-Lightweight RFIDAuthentication Protocols and Its Improvements [J].ACM Operating System Rev.,2007,41(2):83-86 [17] Safkhani M,Bagheri N,Naderi M,et al.Security Analysis ofLMAP++,an RFID Authentication Protocol [C]∥Proc.2011International Conference for Internet Technology and Secured Transactions (ICITST’11).IEEE,2011:689-694 [18] Sun H M,Ting W C,Wang K H.On the Security of Chien’s Ultralightweight RFID Authentication Protocol [J].IEEE Tran-sactions on Dependable and Secure Computing,2011,8(2):315-317 [19] Vajda I,Butty’an L.Lightweight Authentication Protocols for Low-cost RFID Tags [C]∥Proc.Second Workshop on Security in Ubiquitous Computing-Ubicomp (UBICOMP’03).2003 [20] Juels A.Minimalist Cryptography for Low-cost RFID Tags [C]∥SCN’04Proceedings of the 4th International Conference on Security in Communication Networks.Springer Berlin Heidelberg,2005:149-164 [21] Arco P D,De Santis A.On Ultralightweight RFID Authentication Protocols [J].IEEE Transactions on Dependable and Secure Computing,2011,8(4):548-563 [22] Tian Yun,Chen Gong-liang,Li Jian-hua.A New Ultralight-weight RFID Authentication Protocol with Permutation [J].IEEE Communications Letters,2012,16(5):702-705 [23] Wang Shao-hui,Han Zhi-jie,Liu Su-juan,et al.Security Analysis of RAPP An RFID Authentication Protocol based on Permutation [R].Cryptology ePrint Archive,Report 2012/327,2012 [24] Ahmadian Z,Salmasizadeh M,Aref M R.Desynchronization Attack on RAPP Ultralightweight Authentication Protocol [J].Information Processing Letters,2013,113(7):205-209 [25] Peris-Lopez P,Hernandez-Castro J C,Estevez-Tapiador J M,et al.LAMED-A PRNG for EPC Class-1Generation-2RFID Specification [J].Computer Standards and Interfaces,2009,31:88-97 |
No related articles found! |
|