|
[1]M. H. Yang, K. P. Xie, “TTP-Based Group Ownership Transfer in A Mobile RFID Environment,” In International Journal of Digital Content Technology & its Applications, Vol. 7, No. 2, pp 51-69, 2013. [2]A. Juels, “RFID security and privacy: a research survey,” IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 381-394, Feb. 2006. [3]C. Seidler, “RFID Opportunities for Mobile Telecommunication Services,” ITU-T Lighthouse Technical Paper, May 2005.(http://www.itu.int/ITU-T/techwatch/rfid.pdf) [4]H. Lee and J. Kim, “Privacy Threats and Issues in Mobile RFID,” The First International Conference on Availability, Reliability and Security, Apr. 2006, pp. 510-514. [5]S. Engberg, M. Harning, C. Damsgaard Jensen, “Zero-knowledge Device Authentication: Privacy and Security Enhanced RFID preserving Business Value and Consumer Convenience,” Privacy, Security, and Trust, New Brunswick, Canada, Oct. 2004. [6]Ton van Deursen, Sjouke Mauw, Sasa Radomirovic, and Pim Vullers. “Secure Ownership and Ownership Transfer in RFID Systems” In Proc. 14th European Symposium on Research in Computer Security (ESORICS’09), 2009. [7]K. Osaka, T. Takagi, K. Yamazaki, and O. Takahashi, “An Efficient and Secure RFID Security Method with Ownership Transfer,” International Conference on Computational Intelligence and Security, Nov. 2006, pp. 1090-1095. [8]S. Garfinkel, A. Juels, R. Pappu, “RFID Privacy: An Overview of Problems and Proposed Solutions,” IEEE Security & Privacy, vol. 3 Issue 3, May-June 2005, pp.34-43. [9]S. Fouladgar and H. Afifi., “An Efficient Delegation and Transfer of Ownership Protocol for RFID Tags,” In First International EURASIP Workshop on RFID Technology, Vienna, Austria, Sept. 2007. [10]Y. J. Zuo, “Changing Hands Together: A Secure Group Ownership Transfer Protocol for RFID Tags,” Hawaii International Conference on System Sciences, pp. 1-10, Jan. 2010. [11]K. H. S. S. Koralalage, M. R. Selim, J. Miura, Y. Goto, and J. Cheng, “POP Method: An Approach to Enhance the Security and Privacy of RFID Systems Used in Product Lifecycle with an Anonymous Ownership Transferring Mechanism,” Proceedings of the 2007 ACM Symposium on Applied Computing, Mar. 2007, pp. 270-275. [12]P. Jäppinen, H. Hämäläinen, "Enhanced RFID Security Method with Ownership Transfer", In Proceedings of the International Conference on Computational Intelligence and Security, pp. 382-385, 2008. [13]G. Kapoor, S. Piramuthu, ‘‘Vulnerabilities in Some Recently Proposed RFID Ownership Transfer Protocols, ’’ Communications Letters, IEEE , vol.14, no.3, pp.260-262, March 2010. [14]M. H. Yang, Across-authority Lightweight Ownership Transfer Protocol, Electronic Commerce Research and Applications, Volume 10, Issue 4, pp.375-383, 2011. [15]G. Kapoor, W. Zhou, and S. Piramuthu, ‘‘Multi-tag and Multi-owner RFID Ownership Transfer in Supply Chains,’’ Decision Support Systems, vol. 52, no. 1, pp. 258–270, 2011. [16]S. Sundaresan, R. Doss, W. Zhou, and S. Piramuthu, ‘‘Secure Ownership Transfer for Multi-tag Multi-owner Passive RFID Environment with Individual-owner-privacy,’’ Computer Communications, vol. 55, pp. 112–124, Jan. 2015. [17]J. Munilla, M. Burmester, and A. Peinado, ‘‘Attacks on Ownership Transfer Scheme for Multi-tag Multi-owner Passive RFID Environments,’’ Computer Communications, vol. 88, pp. 84–88, Aug. 2016. [18]Eyad Taqieddin‚Hiba Al-Dahoud‚Haifeng Niu‚Jagannathan Sarangapani , ‘‘Tag Ownership Transfer in Radio Frequency Identification Systems: A Survey of Existing Protocols and Open Challenges,’’ IEEE Access‚vol.6‚pp.32117-32155‚June 2018. [19]X. Yang, C. Xu, and C. Li, “A Privacy Model for RFID Tag Ownership Transfer,” Security and Communication Networks, vol. 2017, Mar. 2017, Art. no. 5084636. [20]T. Dimitriou, ‘‘Key Evolving RFID Systems: Forward/Backward Privacy and Ownership Transfer of RFID Tags,’’ Ad Hoc Networks, vol. 37, pp. 195–208, Feb. 2016. [21]C.-C. Lee, C.-L. Cheng, Y.-M. Lai, and C.-T. Li, ‘‘Cryptanalysis of Dimitriou’s Key Evolving RFID Systems,’’ in Proc. 5th International Conference on Network, Communication and Computing, 2016, pp.229–233. [22]D. Molnar, A. Soppera, and D. Wagner, “A Scalable, Delegatable Pseudonym Protocol Enabling Ownership Transfer of RFID Tags,” Selected Areas in Cryptography, vol. 3897, Kingston, Canada, Aug. 2005, pp. 276–290. [23]L. He, Y. Gan, and Y. Yin, ‘‘Secure Group Ownership Transfer Protocol with Independence of Old Owner for RFID Tags,’’ Computer Modelling New Technologies, vol. 18, no. 12B, pp. 209–214, 2014. [24]N. Bagheri, F. Aghili, and M. Safkhani, ‘‘On the Security of Two Ownership Transfer Protocols and Their Improvements,’’ International Arab Journal of Information Technology, vol. 15, no. 1, pp. 87–93, 2018. [25]Eun-Jun Yoon, Kee-Young Yoo, “Two Security Problems of RFID Security Method with Ownership Transfer”, Network and Parallel Computing, Oct. 2008, pp. 68-73. [26]H. B. Chen, W. B. Lee, Y. H. Zhao, Y. L. Chen, “Enhancement of the RFID Security Method with Ownership Transfer,” the 3rd International Conference on Ubiquitous Information Management and Communication, SKKU, Suwon, Korea, Jan. 2009, pp. 251-254. [27]G. Kapoor and S. Piramuthu, ‘‘Single RFID Tag Ownership Transfer Protocols,’’ IEEE Trans. Syst., Man, Cybern. C, Appl. Rev., vol. 42, no. 2, pp. 164–173, Mar. 2012. [28]H. Jannati, A. Falahati, “Cryptanalysis and Enhancement of a Secure Group Ownership Transfer Protocol for RFID Tags,” In International Conference on Global Security, Safety and Sustainability, pp 186-193, 2011. [29]Wei Tim Liew, Kuo Yu Tsai, Jia Ning Luo, Ming Hour Yang, “Novel Designated Ownership Transfer with Grouping Proof,’’ IEEE Conference on Dependable and Secure Computing,2017, pp.433–440. [30]M. H. Yang, ‘‘Secure Multiple Group Ownership Transfer Protocol for Mobile RFID,’’ Electron. Commerce Res. Appl., vol. 11, no. 4, pp. 361–373, 2012. [31]Saravanan Sundaresan, Robin Doss, Wanlei Zhou, “Secure Ownership Transfer in Multi-tag/Multi-owner Passive RFID Systems,’’ IEEE Global Communications Conference (GLOBECOM) ‚ 2013. [32]NIST, FIPS PUB 197, “Advanced Encryption Standard (AES)”, Nov. 2001. [33]RSA Data Security Inc. PKCS#1v2.1: RSA Cryptography Standard, Jan.5, 2001. [34]3GPP;TSG SA, “3G Security; Security Architecture (Release 8),” 3GPP TS 33.102, March 2009. [35]Institute of Electrical and Electronics Engineers, Inc., “Wireless Medium Access Control (MAC) and Physical Layer (PHY) Specifications: Medium Access Control (MAC) Security Enhancements,” Std.802.11i-2004, July. 2004. [36]A. Poschmann, G. Leander, K. Schramm, C. Paar, “New Light-Weight Crypto Algorithms for RFID,” Circuits and Systems, 2007, pp. 1843-1846. [37]M. Hell, T. Johansson, WilliMeier, “Grain - a stream cipher for constrained environments,” International Journal of Wireless and Mobile Computing, Vol. 2, Issue 1,May 2007, pp. 86-93. [38]Internet X.509 Public Key Infrastructure Certificate Management Protocols, Retrieved July. 1, 2009, from the World Wide Web: http://www.ietf.org/rfc/rfc2510.txt [39]J. Kohl and C. Neuman, “The Kerberos Network Authentication Service (V5),”RFC1510, September 1993. [40]A. Shamir, “How to Share a Secret,” Comm. ACM, vol. 24, no. 11,pp. 612-613, Nov. 1979. [41]Zhou, J., Ou, Y. H., Key Tree and Chinese Remainder Theorem Based Group Key Distribution Scheme, Proceedings of the 9th International Conference on Algorithms and Architectures for Parallel Processing, ISBN:978-3-642-03094-9, 2009. [42]L. Xu, C. Huang, “Computation-Efficient Multicast Key Distribution,” IEEE Transactions on Parallel and Distributed Systems, vol. 19, no. 5, pp. 577-587, May, 2008. [43]L. Harn, “Group-oriented (t, n) threshold digital signature scheme and digital multisignature,”IEE Proc.-Comput. Digit. Tech., 141(5), Sept. 1994. [44]L. Gong, R. Needham and R. Yahalom, “Reasoning about belief in cryptographic protocols,” in Computer Society Symposium on Research in Security and Privacy, 1990, pp. 234-248.
|