1 |
M. Jakobsson and D. Pointcheval, "Mutual Authentication for Low-power Mobile Devices," Lecture Notes in Computer Science, pp. 178-195, 2002
|
2 |
Stephen A. Weis, Sanjay E. Sarma, Ronald L. Rivest and Daiel W. Engels, "Security and Privacy Aspects of Low-Cost Radio Frequency Identification Systems", First International Conference on Security in Pervasive Computing, 2003
|
3 |
International Organization for Standardization, "ISO/IEC 18000-3, Information Technology AIDC Techniques - RFID for Item Management," March 2003
|
4 |
Martin Feldhofer, "A Proposal for an Authentication Protocol in a Security Layer for RFID Smart Tags," IEEE Proceedings of MELECON 2004, Vol. 2, pp. 759-762, 2004
|
5 |
J. Yang, K. Ren, and K. Kim, "Security and Privacy on Authentication Protocol for Low-cost RFID," Proceedings of SCIS2005, Jan., pp. 25-28, 2005
|
6 |
D. Eastlake and P. Jones, "US Secure Hash Algorithm 1 (SHA-1)," Internet RFC 3174, September 2001
|
7 |
Weis, S., Sarma, S., Rivest, R., and Engels, D., "Security and Privacy Aspects of Low-Cost RFIDs," Security in Pervasive Computing, Lecture Notes in Computer Science, Vol. 2802, pp. 201-212, 2003
|
8 |
Joan Daemen, Vincent Rijmen, "AES Proposal : Rijndael", (http://csrc.nist.gov/encryption/aes/rijndael/Rijndael.pdf)
|
9 |
Hae-Jung Kim, Eun-jun Yoon, and Jongjung Woo, "Cryptanalysis and Improvement of an RFID Authentication Protocol Based on Private Codes, Journal of KIIT, Vol. 9, No. 5, pp. 103-110, 2011
|