参考文献
|
-
A. Juels(2006).RFID Security and Privacy: A Research Survey.IEEE Journal on Selection Areas in Communications,24(2),381-394.
-
A. Juels,C. Blundo,S. Cimato, (editors)(2004).Minimalist cryptography for low-cost RFID Tags.The Fourth International Conference on Security in Communication Networks-SCN 2004
-
B. Toiruul,K. Lee(2006).An Advanced Mutual-Authentication Algorithm Using AES for RFID Systems.International Journal of Computer Science and Network Security,6(9),156-162.
-
C.-H. Wang,W.-Y. Tsai(2008).An RFID authentication scheme for wireless communication channel.Cryptology and Information Security Conference (CISC)
-
D.N. Duc,J. Park,H. Lee,K. Kim(2006).Enhancing security of EPCglobal GEN-2 RFID Tag against traceability and cloning.The 2006 Symposium on Cryptography and Information Security
-
H.-Y. Chien(2007).SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity.IEEE Transactions on Dependable and Secure Computing,4(4),337-340.
-
H.-Y. Chien,C.-H. Chen(2007).Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards.Computer Standards & Interfaces 29.
-
H.-Y. Chien,C.-W. Huang(2007).Security of ultra-lightweight RFID authentication protocols and its improvements.ACM SIGOPS Operating Systems Review,41(4),83-86.
-
J. Yang,J. Park,H. Lee,K. Ren,K. Kim(2005).ECRYPT Workshop on RFID and Lightweight Crypto.Graz, Austria.
-
K. Yuksel(2004).Dept. of Electronical Engineering, WPI.
-
L. Batina,J. Guajardo,T. Kerins,N. Mentens,P. Tuyls,I. Verbauwhede(2007).Public-Key Cryptography for RFID-Tags.Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW`07)
-
P. Peris-Lopez,J.C. Hernandez-Castro,J.M. Estevez-Tapiador,A. Ribagorda(2006).M2AP: A Minimalist Mutual-Authentication Protocol for Low- Cost RFID Tags.Proc. Int`l Conf. Ubiquitous Intelligence and Computing (UIC`06)
-
S. Karthikeyan,M. Nesterenko(2005).RFID security without extensive cryptography.Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks.
-
S. Mangard,M. Aigner,S. Dominikus(2003).A highly regular and scalable AES hardware architecture.IEEE Trans. Comput.,52(4),483-491.
-
S.-A. Weis,S.-E. Sarma,R.-L. Rivest,D.-W. Engels(2004).Proc. of the 1st Security in Pervasive Computing.LNCS.
-
T. Li,G. Wang(2007).Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols.Proc. 22nd IFIP TC-11 Int`l Information Security Conf..
-
Y.-K. Lee,I. Verbauwhede(2005).International Workshop on Adaptive Wireless Networks-AWiN.Missouri, USA:Saint Louis.
|