Computer Science ›› 2017, Vol. 44 ›› Issue (1): 172-175.doi: 10.11896/j.issn.1002-137X.2017.01.033
Previous Articles Next Articles
HUANG Qi, LING Jie and HE Xiao-tao
[1] MAMUN M S I,MIYAJI A,RAHMAN M S.A secure and private RFID authentication protocol under SLPN problem[C]∥Proc of the 6th Int Conf on Network and System Security.Berlin:Springer,2012:476-489. [2] ALOMAIR B,CUELLAR J,POOVENDRAN R.Scalable RFID systems:A privacy-preserving protocol with constant time identification[J].IEEE Transactions on Parallel and Distributed Systems,2012,3(8):1536-1550. [3] ZHOU S J,ZHANG W Q,LUO J Q.Overview of radio frequency identification (RFID) privacy protection technology [J].Journal of Software,2015,6(4):960-976.(in Chinese) 周世杰,张文清,罗嘉庆.射频识别(RFID)隐私保护技术综述[J].软件学报,2015,6(4):960-976. [4] CALMELS B,CANARD S,GIRAULT M,et al.Low-Cost Cry-ptography for Privacy in RFID Systems[M]∥Domingo-Ferrer J,Posegga J,SchrecklingD,eds.Smart Card Research and Advanced Applications.BerlinHeidelberg:Springer,2006:37-251. [5] DING Z H,LI J T,FENG B.Research on hash-based RFID security authentication protocol [J].Journal of computer Research and Development,2009,6(4):583-592.(in Chinese) 丁振华,李锦涛,冯波.基于Hash函数的RFID安全认证协议研究[J].计算机研究与发展,2009,6(4):583-592. [6] MA C S.Low cost RFID authentication protocol with forward privacy[J].Chinese Journal of Computers,2011,4(8):1387-1397.(in Chinese) 马昌社.前向隐私安全的低成本RFID认证协议[J].计算机学报,2011,4(8):1387-1397. [7] SADIKIN M F,KYAS M.Security and privacy protocol for e-merging smart RFID applications[C]∥Proceeding of the 15th IEEE/ACIS Int’l Conference on Software Engineering,Artificial Intelligence,Networking and Parallel/Distributed Computing.Atlanta:IEEE Computer Society,2014:1-7. [8] YEH K H,LO N W,WINATA E.An efficient ultralightewight authentication protocol for RFID systems[C]∥Proc of RFID Sec Asia 2010.Piscataway,NJ:IEEE,2010:49-60. [9] WANG S H,LIU S J,CHEN D W.Scalable RFID Mutual Authentication Protocol with Backward Privacy[J].Journal of Computer Research and Development,2013,0(6):1276-1284.(in Chinese) 王少辉,刘素娟,陈丹伟.满足后向隐私的可扩展RFID双向认证方案[J].计算机研究与发展,2013,50(6):1276-1284. [10] BURMESTER M,MUNILLA J.Lightweight RFID authentication with forward and backward security [J].ACM Transactions on Information and System Security (TISSEC),2011,4(1):1-11. [11] JIN Y M,WU Q Y,SHI Z Q,et al.RFID Lightweight Authentication Protocol Based on PRF[J].Journal of Computer Research and Development,2014,51(7):1506-1514.(in Chinese) 金永明,吴棋滢,石志强,等.基于PRF的RFID轻量级认证协议研究[J].计算机研究与发展,2014,1(7):1506-1514. [12] SHEN J W,LING J.An improved ultra lightweight RFID authentication protocol[J].Computer Applications and Software,2015,2(2):304-306.(in Chinese) 沈金伟,凌捷.一种改进的超轻量级RFID认证协议[J].计算机应用与软件,2015,2(2):304-306. [13] LU L.Wireless Key Generation for RFID System[J].Chinese Journal of Computers,2015,38(4):822-832.(in Chinese) 鲁力.RFID系统密钥无线生成[J].计算机学报,2015,8(4):822-832. [14] CANTALICE R,MARCELO L,et al.Low power,high-sensit-ivity clock recovery circuit for LF/HF RFID applications[C]∥Proceedings of the 28th Symposium on Integrated Circuits and Systems Design.NewYork:ACM,2015. [15] KUO C,LUK M,NEGI R,et al.Message-in-a-botle:Userfriendly and secure key deployment for sensor nodes[C]∥Proceedings of the 5th International Conference on Embedded Networked Sensor Systems.Sydney,Australia,2007:233-246. [16] SHAMIR A.SQUASH-A new MAC with provable security pro-perties for highly constrained devices such as RFID tags [C]∥Proc of Fast Software Encryption.Berlin:Springer,2008:144-157. [17] SHAMIR A.SQUASH-A new MAC with provable security pro-perties for highly constrained devices such as RFID tags[C]∥Proc of Fast Software Encryption.Berlin:Springer,2008:144-157. [18] ZUO Y.Survivable RFID Systems:Issues,Challenges,and Tech-niques [J].IEEE Transactionson Systems,Man,and Cyberne-tics,Part C:Applications and Reviews,2010,0(4):406-418. [19] FINKENZELLER K.RFID Handbook:Fundamentals and Applications in Comtactless,Smart Cards and Identification(2nd Edition)[M].John Wiley & Sons Ltd,2003. |
No related articles found! |
|