[1]
Hanwei Wu; Sihan Qing; Honglei Li. Security analysis and improvement to digital library RFID protocol[C]. 2012 2nd International Conference on Consumer Electronics, Communications and Networks (CECNet), pp.2834-2837, 21-23 April (2012).
DOI: 10.1109/cecnet.2012.6201873
Google Scholar
[2]
Arazi B. Message Authentication in Computationally Constrained Environments[J]. IEEE Transactions on Mobile Computing, 8(7) : 968-974, (2009).
DOI: 10.1109/tmc.2009.40
Google Scholar
[3]
Sarma S E, Weis S A, Engels D W. RFID systems and security and privacy implications[C]. Proceedings of the 4th International Workshop on Cryptographic Hardware and Embedded Systems (CHES 2002) . Lectures Notes in Computer Science 2523, 454-469, (2003).
DOI: 10.1007/3-540-36400-5_33
Google Scholar
[4]
Weis S A, Sarma S E, Rivest R L, et al. Security and privacy aspects of low-cost radio frequency identification systems[C]. Proceedings of the 1st International Conference on Security in Pervasive Computing . Lectures Notes in Compute Science 2802, 201-212, (2004).
DOI: 10.1007/978-3-540-39881-3_18
Google Scholar
[5]
Ohkubo M, Suzuki K, Kinoshita S. Cryptographic approach to Privacy-Friendly, tags[Z]. In RFID Privacy workshop , MIT, MA, USA. November (2003).
Google Scholar
[6]
Henrici D, Muller P. Hash-based enhancement of location privacy for radio frequency identification devices using varying identifiers[C]. Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops (PERCOMW' 04), Washington : IEEE, 149~153, (2004).
DOI: 10.1109/percomw.2004.1276922
Google Scholar
[7]
Lee S M, Hwang Y J, Lee D H, et al. Efficient authentication for low-cost RFID systems[C]. Proceedings of the International Conference on Computational Science and It's Applications (ICCSA 2005). Lectures Notes in Computer Science 3480. 619~627, (2005).
DOI: 10.1007/11424758_65
Google Scholar
[8]
Peris-Lopez P, Castro J C H, Esteves-Tapiador J M , et al. An Efficient Authentication Protocol for RFID Systems Resistant to Active Attacks[C]. EUC Workshops, 781-794, (2007).
DOI: 10.1007/978-3-540-77090-9_71
Google Scholar
[9]
Zhou Jun, Xu Yong-jun, Li Xiao-wei. A Security Protocol Designed with Proxy for RFID. Proceedings of 2010 Conference on Dependable Computing (CDC'2010). November 20-22, (2010).
Google Scholar