共 11 条
[1]
RFID Security and Privacy:A Research Survey. Juels A. IEEE Journal on Selected Areas in Communications . 2006
[2]
RFID Systems and Security and Privacy Implications. Sarma S,Weis S,Engels D. Proc.of CHES’02 . 2002
[3]
Challenge-response Based RFID Authentication Protocol for Distributed Database Environment. Rhee K,Kwak J,Kim S,et al. Proceedings of the 2nd International Conference on Security in Pervasive Computing . 2005
[4]
Hash-based Enhancement of Location Privacy for Radio-frequency Identification Devices Using Varying. Henrici D,Müller P. Proceedings of the 2nd IEEE Annual Conference on Pervasive Computing and Communications Workshops . 2004
[5]
YA-TRAP:Yet Another Trivial RFID Authentication Protocol. Tsudik G. Proceedings of International Conference on Pervasive Computing and Communications . 2006
[6]
Defining Strong Privacy for RFID. Juels A,Weis S. http://eprint.iacr.org/2006/137 . 2006
[7]
Secure and Low-cost RFID Authentication Protocols. Lee Y,Verbauwhede I. Proceedings of the 2nd IEEE Workshop on Adaptive Wireless Networks . 2005
[8]
Hash-chain Based Forward-secure Privacy Protection Scheme for Low-cost RFID. Ohkubo M,Suzuki K,Kinoshita S. Proceedings of the 2004 Symposium on Cryptography and Information Security . 2004
[9]
Reducing Time Complexity in RFID Systems. Avoine G,Dysli E,Oechslin P. Proceedings of Selected Areas in Cryptography’05 . 2006
[10]
Privacy and Security in Library RFID Issues,Practices,and Architectures. Molnar D,Wagner D. Proceedings of the 11th ACM Conference on Computer and Communications Security . 2004