Juels A. RFID security and privacy: a research survey[J]. IEEE Journal on Selected Areas in Communication, 2006, 24(2): 381-394.
[2]
Le T V, Burmester M, Medeiros B. Universally composable and forward secure RFID authentication and authenticated key exchange//ASIACCS07. New York: ACM Press, 2007: 242-252.
[3]
Cao T J, Bertino E. Security analysis of the SASI protocol[J]. IEEE Transactions on Dependable and Secure Computing, 2009, 6(1): 73-77.
[4]
Song B, Mitchell J C. RFID authentication protocol for low-cost tags//WiSec08. New York: ACM Press, 2008: 140-147.
[5]
Chien H Y, Huang C W. Security of ultra-lightweight RFID authentication protocols and its improvements[J]. ACM Operating System Review, 2007, 41(2): 83-86.
龙士工, 罗文俊, 袁超伟, 等. 串空间模型中的口令猜测攻击[J]. 北京邮电大学学报, 2007, 30(1): 62-65. Long Shigong, Luo Wenjun, Yuan Chaowei, et al. The guess attacks in the strand space model[J]. Journal of Beijing University of Posts and Telecommunications, 2007, 30(1): 62-65.
[8]
Garcia F D, Hasuo I, Pieters W, et al. Provable anonymity//FMSE. Virginia: IEEE Press, 2005: 63-72.
[9]
Feldhofer M, Dominikus S, Wolkerstorfer J. Strong authentication for RFID systems using the AES algorithm//CHES04. Berlin: Springer-Verlag, 2004: 357-370.
[10]
Ouafi K, Phan R. Traceable privacy of recent provably-secure RFID protocols//ACNS08. New York: ACM Press, 2008: 479-489.