|
[1] A. Juels, “Yoking-Proofs for RFID tags,” Proceedings of the Second IEEE Annual Conference on Pervasive Computing and Communications Workshops, PERCOMW ’04, Washington, DC, USA, pp.138–143, IEEE Computer Society, 2004. [2] W. Diffie and M. Hellman, “New directions in cryptography,” Information Theory, IEEE Transactions on, vol.22, no.6, pp.644 – 654, 1976. [3] S. Vaudenay, “On privacy models for RFID,” in Advances in Cryptology ASIACRYPT 2007, ed. K. Kurosawa, Lecture Notes in Computer Science, vol.4833, pp.68–87, Springer Berlin Heidelberg, 2007. [4] N. Koblitz, “Elliptic curve cryptosystems,” Mathematics of Computation, vol.48, no.177, pp. 203–209, 1987. [5] V. Miller, “Use of elliptic curves in cryptography,” Advances in Cryptology CRYPTO 85 Proceedings, ed. H. Williams, Lecture Notes in Computer Science, vol.218, pp.417–426, Springer Berlin Heidelberg, 1986. [6] S. Galbraith, Mathematics of Public Key Cryptography, Cambridge Uuniversity Press, 2012. [7] J. Wolkerstorfer, “Is elliptic-curve cryptography suitable to secure RFID tags?,” In Handout of the Encrypt Workshop on RFID and Lightweight Crypto, 2005. [8] D. Hein, J. Wolkerstorfer, and N. Felber, “ECC is ready for RFID- a proof in silicon,” in Selected Areas in Cryptography, ed. R. Avanzi, L. Keliher, and F. Sica, Lecture Notes in Computer Science, vol.5381, pp.401–413, Springer Berlin Heidelberg, 2009. [9] L. Batina, Y. Lee, S. Seys, D. Singele, and I. Verbauwhede, “Privacy-preserving ECC-based grouping proofs for RFID,” in Information Security, ed. M. Burmester, G. Tsudik, S. Magliveras, and I. Ili, Lecture Notes in Computer Science, vol.6531, pp.159–165, Springer Berlin Heidelberg, 2011. [10] C. Lv, H. Li, J. Ma, B. Niu, and H. Jiang, “Security analysis of a privacy-preserving ECC-based grouping-proof protocol,” Journal of Convergence Information Technology, vol.6, no.3, pp.113–119, 2011. [11] T. Deursen, S. Mauw, and S. Radomirovi, “Untraceability of RFID protocols,” in Information Security Theory and Practices. Smart Devices, Convergence and Next Generation Networks, ed. J. Onieva, D. Sauveron, S. Chaumette, D. Gollmann, and K. Markantonakis, Lecture Notes in Computer Science, vol.5019, pp.1–15, Springer Berlin Heidelberg, 2008. [12] T. Deursen, “50 ways to break RFID privacy,” in Privacy and Identity Management for Life, ed. S. Fischer-Hbner, P. Duquenoy, M. Hansen, R. Leenes, and G. Zhang, IFIP Advances in Information and Communication Technology, vol.352, pp.192–205, Springer Berlin Heidelberg, 2011. [13] W.T. Ko, S.Y. Chiou, E.H. Lu, and H.K.C. Chang, “An improvement of privacy-preserving ECC-based grouping proof for RFID,” Cross Strait Quad-Regional Radio Science and Wireless Technology Conference (CSQRWC), pp.1062–1064, IEEE, 2011. [14] Q. Lin and F. Zhang, “ECC-based grouping-proof RFID for inpatient medication safety,” Journal of Medical Systems, vol.36, no.6, pp.3527–3531, 2012. [15] Y. Fu and Q. Fu, “Scheme and secure protocol of mobile payment based on RFID,” Anti-counterfeiting, Security, and Identification in Communication, 2009. ASID 2009. 3rd International Conference on, pp.631–634, IEEE, 2009. [16] T. Tran, F. Yousaf, and C. Wietfeld, “RFID based secure mobile communication framework for emergency response management,” Wireless Communications and Networking Conference (WCNC), 2010 IEEE, pp.1–6, April 2010. [17] C.L. Chen, J.K. Jan, and C.F. Chien, “Based on mobile RFID device to design a secure mutual authentication scheme for market application,” Broadband, Wireless Computing, Communication and Applications (BWCCA), 2010 International Conference on, pp.423–428, Nov 2010. [18] J. ZHOU, Y. ZHOU, F. XIAO, and X. NIU, “Mutual authentication protocol for mobile RFID systems,” Journal of Computational Information System, pp.3261–3268, Binary Information Press, USA, Nov 2012. [19] S. Garfinkel, A. Juels, and R. Pappu, “RFID privacy: an overview of problems and proposed solutions,” Security Privacy, IEEE, vol.3, no.3, pp.34–43, May 2005. [20] R. Weinstein, “RFID: a technical overview and its application to the enterprise”, IT Professional, vol.7, no.3, pp. 27-33, 2005. [21] J.S. Chou, Y. Chen, C.L. Wu, and C.F. Lin, “An efficient RFID mutual authentication scheme based on ECC,” IACR Cryptology ePrint Archive, vol.2011, no.418, 2011.
|