참고문헌
- D. Lin, H. G. Elmongui, E. Bertino, and B. C. Ooi, 'Data management in RFID applications', International conference on database and expert systems applications, LNCS 4653, pp. 434-444, 2007 https://doi.org/10.1007/978-3-540-74469-6_43
- K.Finkenzeller, 'RFID handbook: fundamentals and applications in Contactless smart cards and identification', (2nd ed.), Munich, Germany: Wiley, 2003
- S. Garfinkel and B. Rosenberg, 'RFID applications, security, and privacy', Boston, USA: Addison-Wesley, 2005
- L.Srivastava, 'Ubiquitous network societies: The case of Radio Frequency Identification, background paper', International telecommunication union (ITU)new initiatives workshop on ubiquitous network societies, Geneva, Switzerland, 2005
- S.Shepard, 'RFID: Radio Frequency Identification', New York, USA: Mc Graw Hill, 2005
- S. A. Weis, S. E. Sarma, and R. L. Rivest, 'Security and privacy aspects of low-cost Radio Frequency Identification systems', Proceedings of first international conference on security in pervasive computing. 2003 https://doi.org/10.1007/978-3-540-39881-3_18
- Y. C. Chen, W. L. Wang, and M. S. Hwang, 'Low-cost RFID authentication protocol for anti-counterfeiting and privacy protection', Asian journal of health and information sciences, Vol. 1, No. 2, pp. 189-203, 2006
- S. Lee, T. Asano, and K. Kim, 'RFID mutual authentication scheme based on synchronized secret information', In proceedings of the SCIS'06, 2006
- H. Y. Chien and C. W. Huang, 'A lightweight RFID protocol using substring', EUC 2007, LNCS 4808, pp. 422-431, 2007 https://doi.org/10.1007/978-3-540-77092-3_37
- T. Cao and P. Shen, 'Cryptanalysis of two RFID authentication protocols', International journal of network security, In press, 2008
- D. N. Duc, J. Park, H. Lee, and K. Kim, 'Enhancing security of EPCglobal GEN-2 RFID tag against traceability and cloning', The 2006 Symposium on Cryptography and Information Security, 2006
- A. D. Henrici and P. MÄuller, 'Hash-based enhancement of location privacy for radio-frequency identification devices using varying identifiers', In the Proceedings of PerSec'04 at IEEE PerCom, 2004, pp. 149-153
- S. Karthikeyan and M. Nesterenko, 'RFID security without extensive cryptography', Proceedings of the 3rd ACM Workshop on Security of Ad Hoc and Sensor Networks, 2005, pp. 63-67 https://doi.org/10.1145/1102219.1102229
- D. Molnar and D. Wagner, 'Privacy and security in library RFID: issues, practices, and architectures', Conference on Computer and Communications Security-CCS04, 2004, pp. 210-219 https://doi.org/10.1145/1030083.1030112
- M. Ohkubo, K. Suzki, and S. Kinoshita, 'Cryptographic approach to 'privacy friendly' tags', RFID Privacy Workshop, 2003
- K. Rhee, J. Kwak, S. Kim, and D. Won, 'Challenge-response based RFID authentication protocol for distributed database environment', International Conference on Security in Pervasive Computing-SPC 2005, 2005, pp. 70-84 https://doi.org/10.1007/978-3-540-32004-3_9
- J. Yang, J. Park, H. Lee, K. Ren, and K. Kim, 'Mutual authentication protocol for low-cost RFID', Handout of the Ecrypt Workshop on RFID and Lightweight Crypto, 2005
- J. Yang, K. Ren, and K. Kim, 'Security and privacy on authentication protocol for low-cost radio', The 2005 Symposium on Cryptography and Information Security, 2005
- 양형규, 안영화, '유비쿼터스 컴퓨팅 환경에 적합한 RFID 인증 프로토콜에 관한 연구,' 전자공학회논문지 42권 CI 1호, pp.45-50, 2005
- 김진목, 유황빈, '유비쿼터스 환경에서 Pre- Distribution을 기반으로 한 안전한 RFID 시스템,' 전자공학회논문지, 제42권, 제CI-6호, pp. 29-36, 2005
- 오선문, 강대성, 'NMF와 LDA 혼합 특징추출을 이용한 해마 학습기반 RFID 생체 인증 시스템에 관한 연구,' 전자공학회논문지, 제43권, 제SP-4호, pp. 46-54, 2006
- 박인정, 현택영, 'RFID를 이용한 작업관리 시스템,' 전자공학회논문지, 제44권, 제CI-2호, pp. 31-36, 2007
- 안해순, 부기동, 윤은준, 남인길, 'RFID/USN 환경을 위한 개선된 인증 프로토콜,' 전자공학회논문지, 제46권, 제CI-1호, pp. 1-10, 2009
- A. J. Menezes, P. C. Oorschot, and S. A. Vanstone, 'Handbook of applied cryptograph', CRC Press, New York, 1997