References
- S.-Y. Kang, D.-G. Lee, I.-Y. Lee, "A Study on Secure RFID Mutual Authentication Scheme in Pervasive Computing Environment," Computer Communications, vol. 31, no. 18, pp. 4248-4254, 2008. https://doi.org/10.1016/j.comcom.2008.05.006
- B. Alomair, L. Lazos, R. Poovendran, "Passive Attacks on a Class of Authentication Protocols for RFID," in Proc. of the 10th International Conference on Information Security and Cryptology, pp. 102-115. 2007.
- H.-Y. Chien, C.-W. Huang, "A Lightweight Authentication Protocol for Low-cost RFID," Journal of Signal Processing Systems, vol. 59, no. 1, pp. 95-102.
- H.-Y. Chien, C.-S. Laih, "ECC-based Lightweight Authentication Protocol with Untraceability for Low-cost RFID, Journal of Parallel Distributed Computing, vol. 69, no. 10, pp. 848-853, 2009. https://doi.org/10.1016/j.jpdc.2009.07.007
- P.D.Arco, A.De Santis, "Weaknesses in a Recent Ultra-lightweight RFID Authentication Protocol," in Proc. of the Cryptology in Africa 1st International Conference on Progress in Cryptology, pp. 27-39, 2008.
- C.Y. Ng, W. Susilo, Y. Mu, R. Safavi-Naini, "New Privacy Results on Synchronized RFID Authentication Protocols Against Tag Tracing," in Proc. of 14th European Conference on Research in Computer Security, pp. 321-336, 2009.
- T. Yeh, C. Wu, Y. Tseng, "Improvement of the RFID Authentication Scheme based on Quadratic Residues, Computer Communications, vol. 34 no. 3, p. 337-341, Mar. 2011. https://doi.org/10.1016/j.comcom.2010.05.011
- T. Yeh, Y. Wang, T. Kuo, S. Wang, Securing RFID Systems Conforming to EPC Class 1 Generation 2 standard," Expert Systems with Applications, vol. 37 no. 12, pp. 7678-7683, Dec. 2010. https://doi.org/10.1016/j.eswa.2010.04.074
- B. Song, C.J., Mitchell, "RFID Authentication Protocol for Low-cost Tags, in Proc. of the first ACM Conference on Wireless Network Security, pp. 140-147, 2008.
- M. B. Paterson, D. R. Stinson, "Two Attacks on a Sensor Network Key Distribution Scheme of Cheng and Agrawal," Journal of Mathematical Cryptology, vol. 2, pp.393-403, 2008.
- D. Molnar, D. Wagner, "Privacy and Security in Library RFID:Issues, Practices, and Architectures, in Proc. of ACM Conference on Computer and Communications Security, pp. 210- 219, 2004.
- D. Henrici, P Muller, "Hash-based Enhancement of Location Privacy for Radio-Frequency Identification Devices using Varying Identifiers, in Proc. of IEEE PerCom Workshops, pp. 149-153, 2004.
- T.V. Le, M. Burmester, B. Medeiros, "Universally Composable and Forward-secure RFID Authentication and Authenticated Key Exchange," in Proc. of ACM Symposium on Information, Computer and Communications Security, pp. 242-252, 2007.
- J. Yang, J. Park, H. Lee, K. Ren, K. Kim, "Mutual Authentication Protocol for Low-cost RFID, in Proc. of Workshop on RFID and Lightweight Cryptography. pp. 17-24, 2005.