[1]Bai Yu, Teng Jianfu, Zhang Liyi, et al. Hash lockbased strengthen synchronization RFID authentication protocol[J]. Computer Engineering, 2009, 35(21):138143. (in Chinese)
[2]Ferraiolo D,Kuhn R.Role based access controls[C]∥Proc of the 15th NISTNCSC National Computer Security Conference, 1992:554563.
[3]Sarma S E, Weis S A, Engels D W. RFID systems and security and privacy implications[C]∥Proc of the 4th International Workshop on Cryptographic Hardware and Embedded Systems(CHE2002), 2003:454469.
[4]Weis S A. Security and privacy in radio frequency identification device[D]. USA:MIT, 2003.
[5]Ohkubo M, Suzuki K, Kinoshita S. Hashchain based forwardsecure privacy protection scheme for lowcost RFID[C]∥Proc of the 2004 Symposium on Cryptography and Information Security(SCIS 2004), 2004:719742.
[6]Li Yankun, Xie Jing, Mao Zhigang. Secure RFID system based on DES encrypt algorithm[J]. Modern Electronic Technique, 2009(1):8793. (in Chinese)
[7]Wu Xuehui, Niu Zhihua, Wang Chao. Security protocol of RFID based on elliptic curve cryptography[J]. Computer Engineering and Design, 2010, 31(24):51655167. (in Chinese)
[8]Li Bin,Ling Li.An NTRU public key encryption system based RFID authentication protocol[J]. Computer Applications and Software, 2012, 29(4):278280. (in Chinese)
[9]Pan Tao, Zuo Kaizhong, Guo Liangmin, et al. Mutual authentication protocol based on XOR operation for lowcost RFID[J]. Computer Engineering, 2012, 38(9):278281. (in Chinese)
[10]Li Yiyang, Sun Gang. An OPDL rulebased RFID date access control mechanism[J]. Communications Technology, 2009, 42(1):239241. (in Chinese)
[11]Wang Guichao, Zhang Aili, Li Yongzhen. Secure authentication protocol of RFID system based on access control[J]. Advanced Engineering Forum,2012,6(9):10721077.
[12]Xie Chuan.RFID authentication protocol based on hash function and key array[J]. Journal of Computer Applications, 2011, 31(3):805811. (in Chinese)
[13]Yang Ling, Chen Zhiqiang. A mutual authentication protocol for lowcost RFID[J]. Computer Applications and Software, 2010, 27(8):298300. (in Chinese)
附中文参考文献:
[1]白煜, 滕建辅, 张立毅, 等. 基于Hash锁的同步强化RFID验证协议[J]. 计算机工程, 2009, 35(21):138143.
[6]李彦堃, 谢憬, 毛志刚. 基于DES算法的RFID安全系统设计[J]. 现代电子技术, 2009(1):8793.
[7]吴学慧, 牛志华, 王潮. 基于椭圆曲线密码的RFID安全协议[J]. 计算机工程与设计, 2010, 31(24):51655167.
[8]李斌, 凌力. 一种基于NTRU公钥加密系统的RFID认证协议[J]. 计算机应用与软件, 2012, 29(4):278280.
[9]潘涛, 左开中, 郭良敏, 等. 基于异或运算的低成本RFID双向认证协议[J]. 计算机工程, 2012, 38(9):278281.
[10]李亦杨, 孙罡. 一种基于OPDL规则的RFID数据访问控制机制[J]. 通信技术, 2009, 42(1):239241.
[12]谢川. 结合Hash函数和密钥阵列的RFID安全认证协议[J]. 计算机应用, 2011, 31(3):805811.
[13]杨灵, 陈志强. 一种低成本RFID的双向认证协议[J]. 计算机应用与软件, 2010, 27(8):298300. |