|
[1]Lopez, P. P., Hernandez-Castro, J. C., Estevez-Tapiador, J.M., and RibaFrda, A., (2006), LMAP: A Real Lightweight Mutual Authentication Protocol for Low-Cost RFID Tags, Proc. Second Workshop RFID Security. [2]Lopez, P. P., Hernandez-Castro, J. C., Estevez-Tapiador, J.M., and Ribagorda, A., (2006), EMAP: An Efficient Mutual Authentication Protocol for Low-Cost RFID Tags, Proc,OTM Federated Conf. and Workshop: IS Workshop. [3]H. Y. Chien , (2007), SASI:A new Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity, IEEE Transactions on Dependable and Secure Computing, 4(4),pp.337–340. [4]Y C Lee , Y C Hsieh , and P S You , (2009) , A New Ultralightweight RFID Protocol with Mutual Authentication. [5]X Zhuang , Z H Wang , C C Chang , and Y Zhu , (2013) , Security Analysis of a new Ultra-lightweight RFID Protocol and Its Improvement. [6]奚正德,張克章,RFID相關應用與安全機制簡介,資訊安全專論,2006 [7]C. C. Tan , and Bo Sheng Qun Li, "Secure and Serverless RFID Authentication and Search Protocols", in IEEE Transactions on Wireless Communications, 2008, pp1400-1407. [8]Ahamed, S.I. Rahman, F. Hoque, E. Kawsar, and F. Nakajima, T., "S3PR: Secure Serverless Search Protocols for RFID " in Information Security and Assurance(ISA), 2008, pp.187-192. [9]Ahamed, S.I. Hoque, E. Rahman, F. Kawsar, and F. Nakajima, T. "YA-SARP: Yet another Serverless Authentication RFID Protocol." in Intelligent Environments, 2008, pp.1-8 [10]Hossain, M.S. Ahamed, S.I., "Towards a Simple Secured Searching Protocol for Future RFID Applications" in Future Trends of Distributed Computing Systems, 2008, pp.151-157 [11]Iuon-Chang Lin , Shih-Chang Tsaur , and Kai-Ping Chang, "Lightweight and serverless RFID Authentication and Search Protocol" in Computer and Electrical Engineering, 2009,pp. 95-99 [12]Kulseng, L. , Zhen Yu Yawen , and Wei Yong Guan ,"Lightweight Secure Search Protocol for Low-cost RFID Systems" in IEEE International Conference on Distributed Computing Systems, 2009, pp.40-48 [13]Tae Youn Won, Ji Young Chun, and Dong Hoon Lee, "Strong Authentication Protocol for Secure RFID Tag Search Without Help of Central Database" in Embedded and Ubiquitous Computing, 2008,pp. 153-158 [14]Hong Lei, and Tianjie Cao, "RFID Protocol Enabling Ownership Transfer to Protect Against Traceability and Dos attacks" in The First International Symposium on Data, Privacy, and E-Commerce (ISDPE), 2007, pp.508-510 [15]T. Dimitriou. , " A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks." in Security and Privacy for Emerging Areas in Communications Networks,2005, pp.59-66 [16]D.Molnar, and D.Wanger. " Privacy and Security in Library RFID: Issues, Practices, and Architectures" in 11th ACM Conference on Computer and Communications Security, 2004, pp.210-219 [17]M.Ohkubo, K. Suzuki, and S.Kinoshita, "Cryptographic Approach to" Privacy-Friendly" Tags", in RFID Privacy Workshop, 2003. pp.21-30 [18]Tsudik, G. "YA-TRAP : Yet Another Trivial RFID Authentication Protocol" in Pervasive Computing and Communications Workshops, 2006, pp.13-17. [19]A.Juels," Strengthening Epc Tags Against Cloning." in Proceedings of the 4th ACM workshop on Wireless Security, 2005, pp.67-76 [20]D.G. Han, T. Takagi, H. W. Kim, and K.I.Chung." New Security Problem in RFID Systems Tag Killing". in Applied Cryptography and Information Security, 2006, pp.375-384 [21]K. Osaka, T. Takagi, K. Yamasaki , and O. Takahashi, "An Efficient and Secure RFID Security Method with Ownership Transfer", in Computational Intelligence and Security, 2006, pp.1090-1093 [22]Min-Hua Shao, " An Effective Privacy-Preserving RFID Scheme Against Desynchronization", in Intelligent Information Hiding and Multimedia Signal Processing, 2007, pp.659-662.
|