[1] |
Lehtonen M O,Michahelles F,Fleisch E. Trust and security in RFIDbased product authentication systems[J]. Systems Journal IEEE,2007,1(2):129144.
|
[2] |
Bagheri N,Safkhani M,Naderi M. Cryptanalysis of a new EPC class1 generation2 standard compliant RFID protocol[J]. Neura Computing and Applications,2014,24(4):799805.
|
[3] |
Jia Zhuofei. The application of RFID technology in the IOTs[J]. Tianjin Science & Technology,2015,42(4):4647.(in Chinese)
|
[4] |
Rahman F,Ahamed S I. Efficient detection of counterfeit products in largescale RFID systems using batch authentication protocols[J]. Personal & Ubiquitous Computing,2014,18(1):177188.
|
[5] |
Lei H,Songhe J,Tao Z,et al. An enhanced 2pass optimistic anonymous RFID authentication protocol with forward security wireless communications[C]∥Proc of the 5th International Conference on Networking and Mobile Computing,2009:14.
|
[6] |
Zhou Shuigeng,Li Feng,Tao Yufei. Privacy preservation in database applications:A survey[J].Chinese Journal of Computers,2009,32(5):848858.(in Chinese)
|
[7] |
Zhou Yongbin,Feng Dengguo. Design and analysis of cryptographic protocols for RFID[ J].Chinese Journal of Computers,2006,29(4):581589.(in Chinese)
|
[8] |
Zhang Ning,Li Ming. Distributed data mining with differential privacy[J].ACM SIGMOD Record,2010,15(1):493502.
|
[9] |
Wu Xinhua,Tang Cuiting. A RFID mutual authentication protocol based on Hash[J]. Journal of Wuhan University of Technology(Transportation Science & Engineering),2011,35(3):571574.(in Chinese)
|
[10] |
Morshed M M,Atkins A,Yu H. An efficient and secure authentication protocol for RFID systems[C]∥Proc of 2011 17th International Conference on Automation and Computing(ICAC),2011:5156.
|
[11] |
Cheng Hesheng, Cheng Hexia. A preliminary study of hopping code technique applied in PEPS system[J]. Journal of Anqing Teachears College(Natural Science Edition),2015,21(2):4448.(in Chinese)
|
[12] |
Aerts W,Biham E,Moitié D D, et al. A practical attack on KeeLoq[J]. Journal of Cryptology,2012,25(1):136157.
|
[13] |
Wang Xin,Xue Xiaoping,Zhang Sidong. Study on data security of RFID[J]. Information Technology and Informatization,2006(1):5153.(in Chinese)
|
[14] |
Fan Hong,Feng Dengguo. Theory and method of security protocols[M],Beijing:Science Press,2003.(in Chinese)
|
[15] |
Good N,Han J,Miles E,et al. Radio frequency identification and privacy with information goods[M]∥S.de Capitani Di Vimercati & P.syverson Editors Workshop on Privacy in the Electronic SocietyWpes,2004:4142.
|
|
附中文参考文献:
|
[3] |
贾卓飞. RFID技术在物联网发展中的应用研究[J]. 天津科技,2015,42(4):4647.
|
[6] |
周水庚,李丰,陶宇飞.面向数据库应用的隐私保护研究综述[J]. 计算机学报,2009,32(5):848858.
|
[7] |
周永彬,冯登国. RFID 安全协议的设计与分析[ J]. 计算机学报,2006,29(4):581589.
|
[9] |
伍新华,唐翠婷.一种基于Hash的RFID双向认证协议[J]. 武汉理工大学学报(交通科学与工程版),2011,35(3):571574.
|
[11] |
程和生,程和侠.应用于PEPS系统的滚动码技术研究[J]. 安庆师范学院学报(自然科学版),2015,21(2):4448.
|
[13] |
王信,薛小平,张思东.RFID系统数据安全研究[J]. 信息技术与信息化,2006(1):5153.
|
[14] |
范红,冯登国.安全协议理论与方法[M]. 北京:科学出版社,2003.
|