Computer Science ›› 2017, Vol. 44 ›› Issue (7): 111-115.doi: 10.11896/j.issn.1002-137X.2017.07.021
Previous Articles Next Articles
HUANG Qi and LING Jie
[1] ZHOU S J,ZHANG W Q,Luo J Q.Overview of radio frequency identification(RFID) privacy protection technology [J].Journal of Software,2015,6(4):960-976.(in Chinese) 周世杰,张文清,罗嘉庆.射频识别(RFID)隐私保护技术综述[J].软件学报,2015,26(4):960-976. [2] MAMUN M S I,MIYAJI A,RAHMAN M S.A secure and private RFID authentication protocol under SLPN problem[C]∥Proc of the 6th Int Conf on Network and System Security.Berlin:Springer,2012:476-489. [3] ALOMAIR B,CUELLAR J,POOVENDRAN R.Scalable RFID systems:A privacy-preserving protocol with constant time identification[J].IEEE Transactions on Parallel and Distributed Systems,2012,23(8):1536-1550. [4] JIN Y M,WU Q Y,SHI Z Q,et al.RFID Lightweight Authentication Protocol Based on PRF[J].Journal of Computer Research and Development,2014,51(7):1506-1514.(in Chinese) 金永明,吴棋滢,石志强,等.基于PRF的RFID轻量级认证协议研究[J].计算机研究与发展,2014,51(7):1506-1514. [5] SHEN J W,LING J.An improved ultra lightweight RFID authentication protocol[J].Computer Applications and Software,2015,2(2):304-306.(in Chinese) 沈金伟,凌捷.一种改进的超轻量级RFID认证协议[J].计算机应用与软件,2015,2(2):304-306. [6] GODOR G,IMRE S.Hash-based mutual authentication protocol for low-cost RFID systems[C]∥Proc of the 18th EUNICE Conf on Information and Communications Technologies.Berlin:Springer,2012:76-87. [7] SURESH T,M R.Mutual authentication protocol for RFID security using NFSR[C]∥IEEE International Conference on Communication Software & Networks.Chengdu,2015:255-259. [8] PENG P,ZHAO Y M,HAN W L,et al.An ultra-lightweight RFID mutual authentication protocol[J].Computer Enginee-ring,2011,37(16):140-142.(in Chinese) 彭朋,赵一鸣,韩伟力,等.一种超轻量级RFID双向认证协议[J].计算机工程,2011,7(16):140-142. [9] DU Z Y,ZHANG G A,YUAN H L.Crossover Based Ultra-lightweight RFID Authentication Protocol[J].Computer Science,2013,40(11):35-37.(in Chinese) 杜宗印,章国安,袁红林.基于交叉位运算的超轻量RFID认证协议[J].计算机科学,2013,0(11):35-37. [10] LIU P,ZHANG C H,Ou Q Y.Authentication security protocol of mobile RFID based on Hash function [J].Journal of Compu-ter Applications,2013,33(5):1350-1352.(in Chinese) 刘鹏,张昌宏,欧庆于.基于Hash函数的移动射频识别互认证安全协议设计[J].计算机应用,2013,33(5):1350-1352. [11] FU X,GUO Y.A lightweight RFID mutual authentication protocol with ownership transfer [J].Communications in Computer and Information Science,2012,334:68-74. [12] NIU B,ZHU X,CHI H,et al.Privacy and authentication protocol for mobile RFID systems [J].Wireless Personal Communications,2014,77(3):1-19. [13] TAO Y,ZHOU X,MA Y P,et al.Mutual authentication protocol of mobile RFID based on Hash function[J].Journal of Computer Applications,2016,36(3):657-660.(in Chinese) 陶源,周喜,马玉鹏,等.基于Hash函数的移动双向认证协议 [J].计算机应用,2016,36(3):657-660. |
No related articles found! |
|