|
[1]. J. Ala-Laurila, J. Mikkonen, and J.Rinnemaa, “Wireless LAN access network architecture for mobile operators,” Communications Magazine, IEEE, Volume 39, Issue: 11, pp.82-89, Nov. 2001. [2]. K. Bicakci and N. Baykal, “Infinite length hash chains and their applications,” Enabling Technologies: Infrastructure for Collaborative Enterprises, 2002 (WET ICE 2002), Eleventh IEEE International Workshops, pp.57-61, 2002. [3]. D. Boneh, X. Boyen and H. Shacham, “Short Group Signatures,” Lecture Notes in Computer Science, Volume 3152, Advances in Cryptology – CRYPTO 2004, Group Signatures, pp.41-55, 2004. [4]. L. Batina, J. Guajardo, T. Kerins and N. Mentens, P. Tuyls and I. Verbauwhede, “Public-Key Cryptography for RFID-tags,” Proceedings of the Fifth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PerComW'07), 2007. [5]. E. Brickell and J. Li, “Enhanced Privacy ID: A Direct Anonymous Attestation Scheme with Enhanced Revocation Capabilities,” Proceedings of the 2007 ACM workshop on Privacy in electronic society, Anonymous communications, pp.21-30, 2007. [6]. E. Bresson and J. Stern. “Efficient Revocation in Group Signatures,” In Proceedings of Public Key Cryptography (PKC'2001), Springer-Verlag, 2001. [7]. J. Camenisch, “Group signature schemes and payment systems based on the discrete logarithm problem,” PhD thesis, vol.2 of ETH-Series in information Security and Cryptography, ISMN 3-89649-286-1, Hartung-Gorre Verlag, Konstanz, 1998. [8]. H.-Y. Chien, “SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity,” IEEE Transactions on Dependable and Secure Computing, Volume 4, Issue 4, pp. 337 – 340, Oct.-Dec. 2007. [9]. H.-Y. Chien and C.-H. Chen, “Mutual authentication protocol for RFID conforming to EPC Class 1 Generation 2 standards,” Computer Standards & Interfaces 29, pp.254–259, 2007. [10]. H.-Y. Chien and C.-W. Huang, “Security of ultra-lightweight RFID authentication protocols and its improvements,” ACM SIGOPS Operating Systems Review, Volume 41 , Issue 4, pp. 83 - 86, July 2007. [11]. D. Chaum and E. van Heyst, “Group Signatures,” Eurocrypt’91, volume 547 of LNCS, pages 257–265. Springer-Verlag, 1992.
[12]. J. Camenisch and A. Lysyanskaya, “Signature Schemes and Anonymous Credentials from Bilinear Maps,” Lecture Notes in Computer Science, Volume 3152, Advances in Cryptology – CRYPTO 2004, Group Signatures, pp.56-72, 2004. [13]. J. Camenisch and M. Michels. Separability and efficiency for generic group signature schemes (extended abstract). In Advances in Cryptology—CRYPTO’ 99, volume 1666 of Lecture Notes in Computer Science, pages 414–430. Springer-Verlag, 1999. [14]. D.-N. Duc, J. Park, H. Lee and K. Kim, “Enhancing security of EPCglobal GEN-2 RFID tag against traceability and cloning,” The 2006 Symposium on Cryptography and Information Security, 2006. [15]. ETSI TS 101 393, Digital Cellular Telecommunications System (Phase 2+); General Packet Radio Service (GPRS); GPRS Charging, v. 7.6.0. [16]. EPCglobal. Available: http://www.EPCglobalinc.org/. July, 2009. [17]. A. Fujii, G. Ohtake, G. Hanaoka and K. Ogawa, “Anonymous Authentication Scheme for Subscription Services,”Lecture Notes in Computer Science-Knowledge-Based, Intelligent Information and Engineering Systems, 4694, pp.975 – 985, 2007. [18]. A. Juels, “Minimalist cryptography for low-cost RFID tags,” C. In Blundo and S. Cimato, editors, The Fourth International Conference on Security in Communication Networks – SCN 2004 , volume 3352 of Lecture Notes in Computer Science, pp. 149–164. Springer-Verlag, 2004. [19]. A. Juels, “RFID Security and Privacy: A Research Survey,” IEEE Journal on Selection Areas in Communications, vol. 24, no. 2, February 2006, pp. 381-394. [20]. Y. Jiang, C. Lin, X. (S.) Shen and M. Shi, “Mutual Authentication and Key Exchange Protocols for Roaming Services in Wireless Mobile Networks,” Wireless Communications, IEEE Transactions on Volume 5, Issue 9, pp.2569 - 2577, September, 2006. [21]. S. Karthikeyan, M. Nesterenko, “RFID security without extensive cryptography,” Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, pp. 63–67, 2005. [22]. Y.-K. Lee and I. Verbauwhede, “Secure and low-cost RFID authentication protocols,” In International Workshop on Adaptive Wireless Networks – AWiN, Saint Louis, Missouri, USA, IEEE, November-December 2005. [23]. T. Li and G. Wang, “Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols,” Proc. 22nd IFIP TC-11 Int’l Information Security Conf., May 2007. [24]. S. Mangard, M. Aigner, and S. Dominikus, “A highly regular and scalable AES hardware architecture.” IEEE Trans. Comput., 52 (4), pp. 483–491, 2003.
[25]. A. Miyaji and K. Umeda, “A Fully-Functional Group Signature Scheme over Only Known-Order Group,” LECTURE NOTES IN COMPUTER SCIENCE(3089), Applied Cryptography and Network Security, Digital Signature, pp.164-179, 2004. [26]. P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, “M2AP: A Minimalist Mutual-Authentication Protocol for Low- Cost RFID tags,” Proc. Int’l Conf. Ubiquitous Intelligence and Computing (UIC ’06), pp. 912-923, 2006. [27]. M. Rahnema, “Overview of the GSM system and protocol architecture,” IEEE Communications Magazine, Volume 31, Issue 4, pp. 92-100, Apr. 1993. [28]. B. Toiruul and K. Lee, “An Advanced Mutual-Authentication Algorithm Using AES for RFID Systems,” International Journal of Computer Science and Network Security, vol. 6, no.9B, pp. 156-162, September 2006. [29]. J. Trevathan and W. Read, “Secure Online English Auctions,” International Conference on Security and Cryptography (SECRYPT’06), pp.387-396, 2006. [30]. Z. Wan, K. Ren and B. Preneel, “A Secure Privacy-Preserving Roaming Protocol Based on Hierarchical Identity-Based Encryption for Mobile Networks,” Proceedings of the first ACM conference on Wireless network security, Device identification and privacy, pp.62-67, 2008. [31]. S.-A. Weis, S.-E. Sarma, R.-L. Rivest, and D.-W. Engels, “Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems,” Proc. of the 1st Security in Pervasive Computing, LNCS, vol. 2802, pp. 201-212, 2004. [32]. K. Yuksel, “Universal Hashing for Ultra-Low-Power Cryptographic Hardware Applications,” Master's Thesis, Dept. of Electronical Engineering, WPI, 2004. [33]. Y. Yang and Beng Chin Ooi, “A Privacy Preserving Rental System”, Lecture Notes in Computer Science(LNCS) Information Security (3650), pp.59~73, 2005. [34]. J. Yang, J. Park, H. Lee, K. Ren and K. Kim, “Mutual Authentication Protocol for Low-cost RFID,” ECRYPT Workshop on RFID and Lightweight Crypto, Graz, Austria, pp. 65-72, July 14-15, 2005. [35]. G. Yang, D.S. Wong and X. Deng, “Anonymous and Authenticated Key Exchange for Roaming Networks,” IEEE Transactions on wireless communication, vol. 6, no. 9, pp.3461-3472, September, 2007.
|