References
- K. Finkenzeller, RFID Handbook, John Wiley & Sons, 1999
- S A Weis, S Sarma, R Rivest, and D. Engels, "Security and privacy aspects of low-cost radio frequency identification systems", Security In Pervasive Computing 2003, LNCS 2802, pp.201-212, 2004.
- S. Junichiro, H. Jae-Cheol, and S. Kouichi, "Enhancing privacy of universal re-encryption scheme for RFID tags," EUC 2004, LNCS 3207, pp.870-890, Springer-Verlag, 2004.
- A.Juels and S. A. Weis, "Authenticating pervasive devices with human protocols", Advances in Cryptogloy-Crypto '05, LNCS 3126, pp.293-308, springer, 2005.
- S.S Kumar and C. Paar, "Are standards compliant Elliptic Curve Cryptosystems Feasible on RFID?", Proceedings of Workshop on RFID security, Austria, July 2006.
- M. Ohkubo, K. Suzuki and S. Kinoshita, "Efficient Hash-Chain Based RFID Privacy Protection Scheme", Privacy Workshop at the Sixth International Conference on Ubiquitous Computing (UbiComp 2004), 2004.
- D. Henrici,, P. Muller, "Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers", Proc. Second IEEE Annual Conference on Pervasive Computing and Communications Workshops. PERCOMW '04, pp.149-153, 2004.
- M. Ohkubo, K. Suzuki, and S. Kinoshita, "A Cryptographic Approach to "Privacy- Friendly" tag", RFID Privacy Workshop, 2003
- G. Avoine, P. Oechslin, "A Scalable and. Provably Secure Hash-based RFID Protocol", IEEE PerSec 2005, March 2005.
- JeaCheol Ha, JungHoon Ha, SangJae Moon, and Colin Boyd, "LRMAP: Lightweight and Resynchronous Mutual Authentication Protocol for RFID System", Ubiquitous Convergence Technology, 2007.
- A. Juels. "Minimalist cryptography for Low-Cost RFID Tags", The Fourth International Conferece on Security in Communication Networks- SCN 2004, LNCS 3352, pp.149-164, 2004.
- D. N. Duc, J. park, H. Lee and K. Kim, "Enhancing Security of EPCgloabal Gen-2 RFID Tag against Traceability and Coning", The 2006 Symposium on Cryptography and Information Security, 2006.
- A. Juels, "Strenthening EPC Tag against Cloning", ACM Workshop on Wireless Security (WiSe), pp.67-76, 2005.
- S. Karthikeyan, and M. Nesterenko, "RFID security without extensive cryptography", Proc. 3rd ACM workshop on Security of ad hoc and sensor networks, pp.63-67, 2005.
- H-Y. Chien, and C-H. Chen, "Mutual Authentication Protocol for RFID Conforming to EPC Class 1 Generation 2 Standards", Computers Standard & Interfaces, 29(2), pp.254-259, 2007. https://doi.org/10.1016/j.csi.2006.04.004
- J. Bringer, H. chabanne, and E. Dottax, "HB++: A Lightweight Authentication Protocol Secure against Some Attacks", Proc. IEEE Int' Conf Pervasive Service, Workshop Security, Privacy and Trust in Pervasive and Ubiquitous Computing, 2006.
- J. Munilla and A.Peinado, "HB-MP:A further step in the HB-family of lightweight authentication protocols", Computer Networks, 51(9): 2262-2267, June 2007. https://doi.org/10.1016/j.comnet.2007.01.011
- P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "LMAP: A Real Lightweight Low-Cost RFID Tags", Proc. Second Workshop RFID Security, July, 2006.
- P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "M2AP: A Minimalist mutual-Authentication Protocol for Low-Cost RFID Tags", Proc. Int' Conf Ubiquitous Intelligence and Computing(UIC, 06), pp.912-923, 2006.
- P. Peris-Lopez, J.C. Hernandez-Castro, J.M. Estevez-Tapiador, and A. Ribagorda, "EMAP: An Efficient Mutual Authentication Protocol for Low-Cost RFID Tags", Proc. OTM Federated Conf and Workshop: IS Workshop, Nov. 2006.
- H.-Y. Chien. "SASI: A New Ultralightweight RFID Authentication Protocol Providing Strong Authentication and Strong Integrity", IEEE Transactions on Dependable and Secure Computing, 4(4), pp.337-340. Oct-Dec, 2007. https://doi.org/10.1109/TDSC.2007.70226
- T. Li and R.H. Deng, "Vulnerability Analysis of EMAP-an Effcinet RFID Mutual Authentication Protocol," Proc. Second International Conference, Availability, Reliability, and Security (AReS'07), 2007.
- T. Li and G. Wang, "Security Analysis of Two Ultra-Lightweight RFID Authentication Protocols," Proc. 22nd IFIP TC-11 International Information Security Conference, May 2007.
- H.-Y. Chien and C.-W. Hung, "Security of Ultra-Lightweight RFID Authentication Protocols and Its Improvements," ACM Operating System Rev, 41(2), pp.83-86, July 2007. https://doi.org/10.1145/1278901.1278916
- 신진섭, 박영호, "RFID/USN 에서의 EXOR과 해쉬함수를 이용한 인증 프로토콜," 한국산업 정보학회논문지, 12(20), pp.24-29, 2007.
- 권혜진, 이재욱, 전동호, 김순자, "데이터베이 스에서 태그 검색이 쉽고 안전한 RFID 상호 인증 프로토콜," 한국정보보호학회논문지, 18(5), pp. 125-134. 2008.
- 안해순, 부기동, 윤은준, 남인길, "RFID/USN 환경을 위한 개선된 인증 프로토콜," 전자공학회논문지, 46(1), 제1호, pp.1-10. 2009.