Computer Science ›› 2017, Vol. 44 ›› Issue (2): 206-208.doi: 10.11896/j.issn.1002-137X.2017.02.033
Previous Articles Next Articles
LIU Yi and GU Guo-sheng
[1] ZHOU S J,ZHANG W Q,LUO J Q.Overview of radio frequency identification (RFID) privacy protection technology [J].Journal of Software,2015,6(4):960-976.(in Chinese) 周世杰,张文清,罗嘉庆.射频识别(RFID)隐私保护技术综述[J].软件学报,2015,6(4):960-976. [2] JIN Y M,WU Q Y,SHI Z Q,et al.RFID Lightweight Authentication Protocol Based on PRF[J].Journal of Computer Research and Development,2014,51(7):1506-1514.(in Chinese) 金永明,吴棋滢,石志强,等.基于PRF的RFID轻量级认证协议研究[J].计算机研究与发展,2014,1(7):1506-1514. [3] LU L.Wireless Key Generation for RFID System[J].Chinese Journal of Computers,2015,38(4):822-832.(in Chinese) 鲁力.RFID系统密钥无线生成[J].计算机学报,2015,8(4):822-832. [4] WANG L M,YI X L,LV C,et al.Security Improvement in Authentication Protocol for Gen-2 Based RFID System[J].JCIT,2011,6(1):157-169. [5] ZHANG J S,WANG W D,MA J,et al.A Novel Authentication Protocol suitable to EPC Class 1 Generation 2 RFID system[J].JCIT,2012,7(3):259-266. [6] AVOINE G,LAURADOUX C,MARTIN T.When Compro-mised Readers Meet RFID[C]∥Workshop on Information Security Applications(WISA’09).2009:36-50. [7] LU L,HAN J,HU L,et al.Dynamic key-updating:Privacy-preserving authentication for rfid systems[C]∥Fifth Annual IEEE International Conference on Pervasive Computing and Communications.2007:13-22. [8] SONG B,MITCHELL C J.RFID authentication protocol forlow-cost tags[C]∥Proceedings of the First ACM Conference on Wireless Network Security.2008:140-147. [9] LO N W,YEH K H.An efficient mutual authentication schemefor epcglobal class-1 generation-2 rfid system[C]∥Proceedings of the 2007 Conference on Emerging Direction in Embedded and Ubiquitous Computing.2007:43-56. [10] ALOMAIR B,CUELLAR J,POOVENDRAN R.Scalable RFID systems:A privacy-preserving protocol with constant time identification [J].IEEE Trans on Parallel and Distributed Systems,2012,3(8):1-10. [11] GODOR G,IMRE S.Hash-based mutual authentication protocol for low-cost RFID systems[C]∥Proc of the 18th EUNICE Conf on Information and Communications Technologies.Berlin:Springer,2012:76-87. [12] MAMUN M S I,MOUAKJI A,RAHMAN M S.A secure and private RFID authentication protocol under SLPN problem[C]∥Proc of the 6th Int Conf on Network and System Security.Berlin:Springer,2012:476-489. [13] WANG S H,LIU S J,CHEN D W.Scalable RFID Mutual Authentication Protocol with Backward Privacy[J].Journal of computer Research and Development,2013,0(6):1276-1284.(in Chinese) 王少辉,刘素娟,陈丹伟.满足后向隐私的可扩展RFID双向认证方案[J].计算机研究与发展,2013,0(6):1276-1284. [14] BOLOTNYY L,ROBINS G.Physically unclonable function-based security and privacy in RFID systems[C]∥Fifth Annual IEEE International Conference on Pervasive Computing and Communications .2007:211-220. [15] KULSENG L,YU Z,WEI Y,et al.Lightweight mutual authentication and ownership transfer for rfid systems[C]∥Procee-dings of the 29th Conference on Information Communications.2010:251-255. [16] KARDAS S,AKGUN M,KIRAZ M S,et al.Cryptanalysis of Lightweight Mutual Authentication and Ownership Transfer for RFID Systems[C]∥Workshop on Lightweight Security & Privacy:Devices,Protocols,and Applications.2011:20-25. |
No related articles found! |
|