[1] |
Want R.An introduction to RFID technology[J].IEEE Pervasive Computing,2006,5(1):2533.
|
[2] |
Weinstein R.RFID:A technical overview and its application to the enterprise[J].IT Professional,2005,7(3):2733.
|
[3] |
Sun H M,Ting W C.A Gen2based RFID authentication protocol for security and privacy[J].IEEE Transactions on Mobile Computing,2009,8(8):10521062.
|
[4] |
Spiekermann S,Evdokimov S.Critical RFID privacyenhancing technologies[J].IEEE Security & Privacy,2009,7(2):5662.
|
[5] |
Pham T A,Hasan M S,Yu H.A RFID mutual authentication protocol based on AES algorithm[C]∥Proc of the 2012 UKACC International Conference on Control,2012:9971002.
|
[6] |
Dehkordi M H,Farzaneh Y.Improvement of the Hashbased RFID mutual authentication protocol[J].Wireless Personal Communications,2014,75(1):219232.
|
[7] |
Wang Guichao,Wang Yan,Li Yongzhen.A RFID secure authentication protocol based on RBAC[J].Computer Engineering & Science,2014,36(5):874878.(in Chinese)
|
[8] |
PerisLopez P,HernandezCastro J C,EstevezTapiador J M,et al.EMAP:An efficient mutualauthentication protocol for lowcost RFID tags[C]∥Proc of the 2006 International Conference on the Move to Meaningful Internet Systems(OTM’06),2006:352361.
|
[9] |
Chien H Y.SASI:A new ultralightweight RFID authentication protocol providing strong authentication and strong integrity[J].IEEE Transactions on Dependable and Secure Computing,2007,4(4):337340.
|
[10] |
Chien H Y,Chen C H.Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards[J].Computer Standards & Interfaces,2007,29(2):254259.
|
[11] |
Chen Y,Chou J S,Sun H M.A novel mutual authentication scheme based on quadratic residues for RFID systems[J].Computer Networks,2008,52(12):23732380.
|
[12] |
Yeh T C,Wu C H,Tseng Y M.Improvement of the RFID authentication scheme based on quadratic residues[J].Computer Communications,2011,34(3):337341.
|
[13] |
Salleh M,Ibrahim S,Isnin I F.Image encryption algorithm based on chaotic mapping[J].Jurnal Teknologi,2012,39(1):112.
|
[14] |
He Tingting,Luo Xiaoshu,Liao Zhixian,et al.A new chaos mapping Hash function structural method and its application[J].Acta Phys Sin,2012,61(11):11050611105067.(in Chinese)
|
[15] |
Zhao Genhua,He Yigang.RFID secure mechanism based on chaotic encryption[J].Computer Engineering,2011,37(12):116118.(in Chinese)
|
[16] |
Zhang Jianhua,Zhang Nan.Chaosbased mutual authentication protocol for RFID[J].Journal of Southwest University for Nationalities(Natural Science Edition),2014,40(4):531536.(in Chinese)
|
[17] |
Wang S,Ma Q,Zhang Y,et al.An authentication protocol for RFID tag and its simulation[J].Journal of Networks,2011,6(3):446453.
|
[18] |
Fan Jiulun,Zhang Xuefeng.Piecewise logistic chaotic map and its performance analysis[J].Acta Electronica Sinica,2009,37(4):720725.(in Chinese)
|
|
附中文参考文献:
|
[7] |
王桂超,王彦,李永珍.基于RBAC的RFID安全认证协议[J].计算机工程与科学,2014,36(5):874878.
|
[14] |
何婷婷,罗晓曙,廖志贤,等.一种新的混沌映射散列函数构造方法及应用[J].物理学报,2012,61(11):11050611105067.
|
[15] |
赵艮华,何怡刚.基于混沌加密的无线射频识别安全机制[J].计算机工程,2011,37(12):116118.
|
[16] |
张建华,张楠.基于混沌RFID双向认证协议[J].西南民族大学学报(自然科学版),2014,40(4):531536.
|
[18] |
范九伦,张雪锋.分段Logistic 混沌映射及其性能分析[J].电子学报,2009,37(4):720725.
|