[1]Rhee K,Kwak J,Kim S,et al.Challenge-response based RFID authentication protocol for distributed database environment. [G]//LNCS 3450:Proc of the Int Conf on Security in Pervasive Computing. Berlin:Springer,2005:70-84
[2] 周永彬,冯登国,RFID安全协议的 设计与分析[J].计算机学报,2006,29(4):581-589
[3] Burmester M,Medeiros B,Motta R,et al.Anonymous RFID authentication with constant key-lookup[C]//Proc of the 2008 ACM Symp on Information, Computer and Communications Security.New York:ACM,2008;283-291
[4] Sarma S E, Weis S A, Engels D W. RFID systems and security and privacy implications [C]//Proc of Int Workshop on Cryptographic Hardware and Embedded Systems.Berlin: Springer ,2003: 454- 469
[5] Sarma S E,Weis S A, Engels D W. Radiofrequency identification: Secure risks and challenges [J] . RSA Laboratories Cryptophytes, 2003, 6( 1) : 2- 9
[6] Juels A, Rivest R L, Szydlo M. The blocker tag: Selective blocking of RFID tags for consumer privacy[C]//Proc of the 10th ACM Conf on Computer and Communication Security.New York:ACM, 2003: 103- 111
[7] 陈瑞鑫,邹传云,黄景武.一种基于双向Hash认证的RFID安全[J].协议, 微计算信息,2010, 26 11:149-151
[8] Zhou S J,Zhang Z,Luo Z etal. A lightweight anti-desynchronization RFID authentication protocol[J]. Information Systems Frontiers, 2010,12( 5) : 521 - 52
[9] Duc D N, Kim K. Defending RFID authentication protocols against DoS attacks[J]. Computer Communications, 2011, 34( 3) : 384 -390
[10] Ohkubo M, Suzuki K, Kinoshita S. Efficient hash-chain based RFID privacy protection scheme [C]//Proc of Int Conf on Ubiquitous Computing Ubicomp, Workshop.2004:50-59
[11] Tsudik G. YA-TRAP: yet another trivial RFID authentication protocol[C]//Proc of 4th Annual IEEE Int Conf on Pervasive Computing and Communications Workshops. Piscataway,NJ: IEEE,2006:640-643
[12] Chien H Y, Hhuang CW. A lightweight authentication protocol for low-cost RFID [J]. Journal of Signal Processing Systems, 2010,
59( 1) : 95 - 102
[13] Fernàndez-Mir A, Castellà-Roca J, Viejo A. Secure and scalable RFID authentication protocol[G]//LNCS 6514: Proc of the 5th Int Workshop on Data Privacy Management,Berlin: Springer, 2011: 231 - 243
[14] 张 顺,陈海进,轻量级的无线射频识别安全认证协议[J].计算机应用,2012,32( 7) : 2010 - 2014