3Duc D N,Park J,Lee H, et al.Enhancing Security of EPCglobal GEN-2RFID Tag Again Traceability and cloning[].Proceedings of theSymposium on Cryptography and Information Security.2006 被引量:1
4Chien H Y,Chen C H.Mutual authentication protocol forRFID conforming to EPC class 1 generation 2 standards[].Computers and Standards.2007 被引量:1
5OHKUBO M,SUZUKI K,KINOSHITA S.Hash-chain based forward-secure privacy protection scheme for low-cost RFID[].Proceedings of theSy mposium on Cr y ptog raphy and Information Security.2004 被引量:1
6Konidala D M,Kim K.RFID Tag-Reader Mutual Authentication Scheme Utilizing Tag’’s Access Password[].Auto-ID Labs White Pa per.2007 被引量:1
1Osaka K, Takagi T. An Efficient and Secure RFID Security Method with Ownership Transfer[C]//Proc. of Computational Intelligence and Security. Guangzhou, China: [s. n.], 2006: 1090-1095. 被引量:1
2Hun-Wook K, Shu-Yun L, Hoon-Jae L. Symmetric Encryption in RFID Authentication Protocol for Strong Location Privacy and Forward-Security[C]//Proc. of Conference on Hybrid Information Technology. Cheju Island, Korea: [s. n.], 2006: 718-723. 被引量:1
3Zhang Lan, Zhou Huaibei, Kong Ruoshan. An Improved Approach to Security and Privacy of RFID Application System[C]//Proc. of Wireless Communications, Networking and Mobile Computing Conference. Wuhan, China: [s. n.], 2005: 1195-1198. 被引量:1
4Dimitriou T. A Lightweight RFID Protocol to Protect Against Traceability and Cloning Attacks[C]//Proc. of Conference on Security and Privacy for Emerging Areas in Communications Networks. Athens, Greece: [s. n.], 2005: 59-66. 被引量:1