[1]Roland M, Langer J. Digital Signature Records for the NFC Data Exchange Format[C]∥Proc of the 2nd International Workshop on Near Field Communication, 2010:7176.
[2]Ortiz E. An Introduction to NearField Communication and the Contactless Communication API [EB/OL].[20081015].http://java.sun.com/developer/technicalArticles/javame/nfc/.
[3]Francis L, Hancke G,Mayes K, et al. A Security Framework Model with Communication Protocol Translator Interface for Enhancing NFC Transactions[C]∥Proc of the Sixth Advanced International Conference on Telecommunications, 2010:45261.
[4]Madlmayr G, Langer J, Kantner C, et al. NFC Devices: Security and Privacy[C]∥Proc of the Third International Conference on Availability, Reliability and Security, 2008:642647.
[5]TCG MPWG, Mobile Trusted Module Specification, version 1.0, Revision 1[EB/OL].[20070612]. https://www.trustedcomputinggroup.org/specs/mobilephone/tcgmobiletrustedmodule1.0.pdf.
[6]TCG MPWG, TCG Mobile Reference Architecture. Specification version 1.0, Revision 1[EB/OL].[20070612].https://www.trustedcomputinggroup.org/specs/mobilephone/tcgmobilereferencearchitecture1.0.pdf.
[7]Chen Liqun, Page D, Smart N P. On the Design and Implementation of an Efficient DAA Scheme[R]. Report 2009/598,Cryptology ePrint Archive, 2009.
[8]Brickell E, Camenisch J, Chen L. Direct Anonymous Attestation[C]∥Proc of ACM Conference on Computer and Communications Security, 2004:132145.
[9]刘明辉,辛阳,杨义先,等. 基于直接匿名认证的CardnotPresent支付系统[J].北京邮电大学学报,2008,31(4):9093.
[10]Leung A, Mitchell C J. Ninja: Non Identity Based, Privacy Preserving Authentication for Ubiquitous Environments[C]∥Proc of UbiComp’07, 2007:7390.
[11]Dietrich K. Anonymous RFID Authentication Using Trusted Computing Technologies[C]∥Proc of RFIDSec’10, 2010:91102.
[12]Wachsmann C, Chen Liqun, Dietrich K, et.al. Lightweight Anonymous Authentication with TLS and DAA for Embedded Mobile Devices[C]∥Proc of ISC’10, 2011:8498.
[13]Cesena E, Lohr H, Ramunno G, et.al. Anonymous Authentication with TLS and DAA [J]∥Proc of TRUST’10, 2010:4762.
[14]杨力, 马建华, 裴庆祺,等. 直接匿名的无线网络可信接入认证方案 [J]. 通信学报, 2010, 31(8):98104.
[15]彭华嘉,冯登国. 匿名无线认证协议的匿名性缺陷和改进[J]. 通信学报, 2006, 27(9):7885.
[16]朱辉, 李晖, 苏万力,等. 基于身份的匿名无线认证方案[J]. 通信学报, 2009, 30(4):130136. |